Multics security evaluation: vulnerability analysis (PDF)
Speaker Biographies (PDF)
Message from the Conference Chair (PDF)
Conference Committee (PDF)
Program Committee (PDF)
Tutorial Committee (PDF)
Reviewers (PDF)
The Common Sense of System Design (PDF)
Composable Tools For Network Discovery and Security Analysis (Abstract)
Representing TCP/IP Connectivity For Topological Analysis of Network Security (Abstract)
Regulating E-Commerce through Certified Contracts (Abstract)
With Gaming Technology towards Secure User Interfaces (Abstract)
Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption (Abstract)
Throttling Viruses: Restricting propagation to defeat malicious mobile code (Abstract)
Enforcing Resource Bound Safety for Mobile SNMP Agents (Abstract)
Security of Internet Location Management (Abstract)
Wireless Security: Vulnerabilities and Countermeasures (PDF)
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later (Abstract)
Thirty Years Later: Lessons from the Multics Security Evaluation (Abstract)
Controlled Physical Random Functions (Abstract)
A Security Architecture for Object-Based Distributed Systems (Abstract)
A Secure Directory Service based on Exclusive Encryption (Abstract)
Protecting Data from Malicious Software (Abstract)
Safe Virtual Execution Using Software Dynamic Translation (Abstract)
Digging For Worms, Fishing For Answers (Abstract)
A Framework for Organisational Control Principles (Abstract)
Reusable Components for Developing Security-Aware Applications (Abstract)
A Context-Aware Security Architecture for Emerging Applications (Abstract)
Voice over IPsec: Analysis and Solutions (Abstract)
Gender-Preferential Text Mining of E-mail Discourse (Abstract)
Themes and Highlights of the New Security Paradigms Workshop 2002 (PDF)
Evaluating the Impact of Automated Intrusion Response Mechanisms (Abstract)
Architectures for Intrusion Tolerant Database Systems (Abstract)
Detecting and Defending against Web-Server Fingerprinting (Abstract)
Advanced Features for Enterprise-Wide Role-Based Access Control (Abstract)
Access Control for Active Spaces (Abstract)
A Model for Attribute-Based User-Role Assignment (Abstract)
Intrusion Detection: Current Capabilities and Future Directions (Abstract)
Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With A Security Decision (Abstract)
Security Architecture of the Austrian Citizen Card Concept (Abstract)
Malicious Code Detection for Open Firmware (Abstract)
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks (Abstract)
A Toolkit for Detecting and Analyzing Malicious Software (Abstract)