Secure dynamic adaptive traffic masking (DOI)
Brenda Timmerman
Security architecture-based system design (DOI)
Edward A. Schneider
Survivability—a new technical and business perspective on security (DOI)
Howard F. Lipson, David A. Fisher
Optimistic security: a new access control paradigm (DOI)
Dean Povey
Discussion: strike back: offensive actions in information warfare (DOI)
Donald J. Welch, Nathan Buchheit, Anthony Ruocco
Security service level agreements: quantifiable security for the enterprise? (DOI)
Ronda R. Henning
A cursory examination of market forces driving the use of protection profiles (DOI)
Kenneth G. Olthoff
Report on the discussion of “A cursory examination of market forces driving the common criteria” (DOI)
Kenneth G. Olthoff
Paradigm shifts in protocol analysis (DOI)
Susan Pancho
Secure group management in large distributed systems: what is a group and what does it do? (DOI)
John McHugh, J. Bret Michael
SASI enforcement of security policies: a retrospective (DOI)
Úlfar Erlingsson, Fred B. Schneider
Security modeling in the COTS environment (DOI)
Tom Markham, Dwight Colby, Mary Denz
On the functional relation between security and dependability impairments (DOI)
Erland Jonsson, Lars Strömberg, Stefan Lindskog
Securing information transmission by redundancy (DOI)
Jun Li, Peter Reiher, Gerald Popek
The high assurance brake job—a cautionary tale in five scenes (DOI)
Kenneth G. Olthoff