Foreward (DOI)
Hilary H. Hosmer
'TSUPDOOD?: Repackaged problems for you and MMI (DOI)
Rebecca G. Bace, Marvin Schaefer
Security for infinite networks (DOI)
Ruth Nelson, Hilary Hosmer
Research issues in authorization models for hypertext systems (DOI)
Elisa Bertino, Pierangela Samarati
Unhelpfulness as a security policy: or it's about time (DOI)
Ruth Nelson
QuARC: expressive security mechanisms (DOI)
John D. Yesberg, Mark S. Anderson
Administration in a multiple policy/domain environment: the administration and melding of disparate policies (DOI)
William R. Ford
Virtual enterprises and the enterprise security architecture (DOI)
Tom Haigh
Software system risk management and assurance (DOI)
Sharon K. Fletcher, Roxana M. Jansma, Judy J. Lim, Ron Halbgewachs, Martin D. Murphy, Gregory D. Wyss
Applying the dependability paradigm to computer security (DOI)
Catherine Meadows
Pretty good assurance (DOI)
Jeffrey R. Williams, Marv Schaefer, Douglas J. Landoll
Credentials for privacy and interoperation (DOI)
Vicki E. Jones, Neil Ching, Marianne Winslett