Marshall D. Abrams Security Engineering in an Evolutionary Acquisition Environment. [Citation Graph (0, 0)][DBLP] Workshop on New Security Paradigms, 1998, pp:11-20 [Conf]
Erland Jonsson An Integrated Framework for Security and Dependability. [Citation Graph (0, 0)][DBLP] Workshop on New Security Paradigms, 1998, pp:22-29 [Conf]
John P. McDermott Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity Attacks. [Citation Graph (0, 0)][DBLP] Workshop on New Security Paradigms, 1998, pp:48-51 [Conf]
Crispin Cowan, Calton Pu Death, Taxes, and Imperfact Software: Surviving the Inevitable. [Citation Graph (0, 0)][DBLP] Workshop on New Security Paradigms, 1998, pp:54-70 [Conf]
LiWu Chang, Ira S. Moskowitz Parsimonious Downgrading and Decision Trees Applied to the Inference Problem. [Citation Graph (0, 0)][DBLP] Workshop on New Security Paradigms, 1998, pp:82-89 [Conf]