Skip to main content
Home
New Security Paradigms Workshop

NSPW 1998 Proceedings

Toward a secure system engineering methodolgy (DOI)
Chris Salter, O. Sami Saydjari, Bruce Schneier, Jim Wallner

Security engineering in an evolutionary acquisition environment (DOI)
Marshall D. Abrams

An integrated framework for security and dependability (DOI)
Erland Jonsson

Meta objects for access control: a formal model for role-based principals (DOI)
Thomas Riechmann, Franz J. Hauck

Evaluating system integrity (DOI)
Simon N. Foley

Prolepsis on the problem of Trojan-horse based integrity attacks (position paper) (DOI)
J. McDermott

Death, taxes, and imperfect software: surviving the inevitable (DOI)
Crispin Cowan, Calton Pu

A graph-based system for network-vulnerability analysis (DOI)
Cynthia Phillips, Laura Painton Swiler

Parsimonious downgrading and decision trees applied to the inference problem (DOI)
LiWu Chang, Ira S. Moskowitz

Server-assisted cryptography (DOI)
Donald Beaver

Discussion topic: what is the old security paradigm? (DOI)
Steven J. Greenwald

Tolerating penetrations and insider attacks by requiring independent corroboration (DOI)
Clifford Kahn

A new model for availability in the face of self-propagating attacks (DOI)
Meng-Jang Lin, Aleta M. Ricciardi, Keith Marzullo

Main menu

Show — Main menu Hide — Main menu
  • Home
  • NSPW 2025
    • Call for papers
    • Organizers
  • Past Workshops
  • Proceedings
    • All Papers
    • 2022
    • 2021
    • 2020
    • 2019
    • 2018
    • 2017
    • 2016
    • 2015
    • 2014
    • 2013
    • 2012
    • 2011
    • 2010
    • 2009
    • 2008
    • 2007
    • 2006
    • 2005
    • 2004
    • 2003
    • 2002
    • 2001
    • 2000
    • 1999
    • 1998
    • 1997
    • 1996
    • 1995
    • 1994
    • 1992 & 1993
  • Code of Conduct
  • Login