| 1997 | 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA |
| 1997 | A Reference Model for Firewall Technology. Christoph L. Schuba, Eugene H. Spafford |
| 1997 | Achieving User Privacy in Mobile Networks. Bob Askwith, Madjid Merabti, Qi Shi, K. Whiteley |
| 1997 | An Architecture for Multilevel Secure Interoperability. Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz |
| 1997 | An Efficient Message Authentication Scheme for Link State Routing. S. Cheung |
| 1997 | An Improved E-Mail Security Protocol. Bruce Schneier, Chris Hall |
| 1997 | Applying the DOD Goal Security Architecture as a Methodology for the Development of System and Enterprise Security Architecture. T. Lowman, D. Mosier |
| 1997 | Detection and Classification of TCP/IP Network Services. Kymie M. C. Tan, Blair R. Collie |
| 1997 | Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. John P. McDermott, R. Gelinas, S. Ornstein |
| 1997 | Domain and Type Enforcement Firewalls. Karen A. Oostendorp, Lee Badger, C. D. Vance, W. G. Morrison, Michael J. Petkac, David L. Sherman, Daniel F. Sterne |
| 1997 | Ethical Responsibilities and Legal Liabilities of Network Security Professionals. F. C. Smith |
| 1997 | Implementing RBAC on a Type Enforced System. J. Hoffman |
| 1997 | Incremental Assurance for Multilevel Applications. Dan Thompson, M. Denz |
| 1997 | Kernel and Shell-Based Applications Integrity Assurance. George M. Mohay, J. Zellers |
| 1997 | Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System. T. F. Himdi, Ravi S. Sandhu |
| 1997 | Micro-Digital Money for Electronic Commerce. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan |
| 1997 | On the Key Recovery of the Key Escrow System. Yung-Cheng Lee, Chi-Sung Laih |
| 1997 | PCASSO: Applying and Extending State-of-the-Art Security in the Healthcare Domain. Dixie B. Baker, Robert M. Barnhart, T. T. Buss |
| 1997 | Protecting Unattended Computers Without Software. Carl E. Landwehr |
| 1997 | Remote Electronic Gambling. Chris Hall, Bruce Schneier |
| 1997 | Risk Assessment for Large Heterogeneous Systems. James W. Freeman, T. C. Darr, Richard B. Neely |
| 1997 | Secure and Efficient Digital Coins. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan |
| 1997 | Securing an Object Relational Database. Sharon R. Lewis, Simon R. Wiseman |
| 1997 | Simple Assured Bastion Hosts. C. Cant, Simon R. Wiseman |
| 1997 | Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores. Simon N. Foley |
| 1997 | The Secure Distribution of Digital Contents. Eberhard von Faber, R. Hammelrath, F.-P. Heider |
| 1997 | Threshold and Generalized DSS Signatures without a Trusted Party. Chih-Hung Wang, Tzonelih Hwang |
| 1997 | Using Kernel Hypervisors to Secure Applications. T. Mitchem, R. Lu, R. O'Brian |
| 1997 | Using Type Enforcement to Assure a Configurable Guard. P. Greve, J. Hoffman, R. E. Smith |
| 1997 | Using Web Technologies in Two MLS Environments: A Security Analysis. R. E. Niemeyer |