Toward a secure system engineering methodolgy (DOI)
Chris Salter, O. Sami Saydjari, Bruce Schneier, Jim Wallner
Security engineering in an evolutionary acquisition environment (DOI)
Marshall D. Abrams
An integrated framework for security and dependability (DOI)
Erland Jonsson
Meta objects for access control: a formal model for role-based principals (DOI)
Thomas Riechmann, Franz J. Hauck
Evaluating system integrity (DOI)
Simon N. Foley
Prolepsis on the problem of Trojan-horse based integrity attacks (position paper) (DOI)
J. McDermott
Death, taxes, and imperfect software: surviving the inevitable (DOI)
Crispin Cowan, Calton Pu
A graph-based system for network-vulnerability analysis (DOI)
Cynthia Phillips, Laura Painton Swiler
Parsimonious downgrading and decision trees applied to the inference problem (DOI)
LiWu Chang, Ira S. Moskowitz
Server-assisted cryptography (DOI)
Donald Beaver
Discussion topic: what is the old security paradigm? (DOI)
Steven J. Greenwald
Tolerating penetrations and insider attacks by requiring independent corroboration (DOI)
Clifford Kahn
A new model for availability in the face of self-propagating attacks (DOI)
Meng-Jang Lin, Aleta M. Ricciardi, Keith Marzullo