Message from the Program Chairs (PDF)
Conference Committee (PDF)
Some weaknesses of the TCB model (Abstract)
Toward acceptable metrics of authentication (Abstract)
An Authorization Scheme For Distributed Object Systems (Abstract)
A Logical Language for Expressing Authorizations (Abstract)
Anonymous Connections and Onion Routing (Abstract)
The design and implementation of a multilevel secure log manager (Abstract)
A secure and reliable bootstrap architecture (Abstract)
An MBone Proxy for an Application Gateway Firewall (Abstract)
Secure software architectures (Abstract)
A general theory of security properties (Abstract)
Analyzing consistency of security policies (Abstract)
Ensuring assurance in mobile computing (Abstract)
Filtering postures: local enforcement for global policies (Abstract)
Providing flexibility in information flow control for object oriented systems (Abstract)
Automated analysis of cryptographic protocols using Mur/spl phi/ (Abstract)
How to Systematically Classify Computer Security Intrusions (Abstract)
Surviving information warfare attacks on databases (Abstract)
Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery (Abstract)
Escort: securing Scout paths (PDF)
Deniable password snatching: on the possibility of evasive electronic espionage (Abstract)
Number theoretic attacks on secure password schemes (Abstract)
Author Index (PDF)