| 1998 | 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA |
| 1998 | A Certified E-Mail Protocol. Bruce Schneier, James Riordan |
| 1998 | A Hardware-Independent Encryption Model for ATM Devices. Herbert Leitold, Udo Payer, Reinhard Posch |
| 1998 | A Practical Approach to Measuring Assurance. George F. Jelen, Jeffrey R. Williams |
| 1998 | A Scheme for Analyzing Electronic Payment Systems. Lucas C. Ferreira, Ricardo Dahab |
| 1998 | An Architecture for Intrusion Detection Using Autonomous Agents. J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, Eugene H. Spafford, Diego Zamboni |
| 1998 | An Environment for the Specification and Analysis of Cryptoprotocols. Mourad Debbabi, Y. Legaré, Mohamed Mejri |
| 1998 | Anonymous Secure E-Voting Over a Network. Yi Mu, Vijay Varadharajan |
| 1998 | Application-Level Isolation to Cope with Malicious Database Users. Sushil Jajodia, Peng Liu, Catherine D. McCollum |
| 1998 | Authorization in Enterprise-Wide Distributed System: A Practical Design and Application. Vijay Varadharajan, Chris Crall, Joe Pato |
| 1998 | Complexity Measure of Encryption Keys Used for Securing Computer Networks. M. A. Bahie-Eldin, A. A. Omar |
| 1998 | Concentric Supervision of Security Applications: A New Security Management Paradigm. P. C. Hyland, Ravi S. Sandhu |
| 1998 | Controlling Applets' Behavior in a Browser. Vesna Hassler, O. Then |
| 1998 | Detecting Anomalous and Unknown Intrusions Against Programs. Anup K. Ghosh, James Wanken, Frank Charron |
| 1998 | Electronic Submission Protocol Based on Temporal Accountability. Michiharu Kudo |
| 1998 | How to Increase Security in Mobile Networks by Anomaly Detection. Roland Büschkes, Dogan Kesdogan, Peter Reichl |
| 1998 | ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System. Yuh-Min Tseng, Jinn-ke Jan |
| 1998 | Intrusion Detection Applying Machine Learning to Solaris Audit Data. D. Endler |
| 1998 | Maintaining Security in Firm Real-Time Database Systems. Quazi N. Ahmed, Susan V. Vrbsky |
| 1998 | Modeling Secure and Fair Electronic Commerce. Alexander W. Röhm, Günther Pernul, Gaby Herrmann |
| 1998 | Multifunctional Smart Cards for Electronic Commerce-Application of the Role and Task-Based Security Model. Kathrin Schier |
| 1998 | Mutual Authentication, Confidentiality, and Key Management (MACKMAN) System for Mobile Computing and Wireless Communication. Tasneem G. Brutch, Paul C. Brutch |
| 1998 | NetSTAT: A Network-Based Intrusion Detection Approach. Giovanni Vigna, Richard A. Kemmerer |
| 1998 | Private Desktops and Shared Store. Bryony Pomeroy, Simon R. Wiseman |
| 1998 | Protecting Web Servers from Security Holes in Server-Side Includes. Jared Karro, Jie Wang |
| 1998 | Role-Based Access Control Framework for Network Enterprises. D. J. Thomsen, D. O'Brien, J. Bogle |
| 1998 | Rule-Based Filtering for Java Applets. Pietro Iglio, Fausto Fraticelli, Luigi Giuri |
| 1998 | Secure Signaling and Access Control for ATM Networks. Rajan Shankaran, Vijay Varadharajan |
| 1998 | Security Architecture for a Virtual Heterogeneous Machine. Roger Wright, David J. Shifflett, Cynthia E. Irvine |
| 1998 | Security Services in an Open Service Environment. Reiner Sailer |
| 1998 | Selection Criteria for Intrusion Detection Systems. Edward Amoroso, R. Kwapniewski |
| 1998 | The RRA97 Model for Role-Based Administration of Role Hierarchies. Ravi S. Sandhu, Qamar Munawer |
| 1998 | The Solar Trust Model: Authentication Without Limitation. Michael Clifford, C. Lavine, Matt Bishop |
| 1998 | Towards an Infrastructure for MLS Distributed Computing. Myong H. Kang, Judith N. Froscher, Brian J. Eppinger |
| 1998 | Two Improved Algorithms and Hardware Implementations for Key Distribution Using Extended Programmable Cellular Automata. Chang N. Zhang, Ming Y. Deng, Ralph Mason |
| 1998 | Wachet auf! Computer Security and the Millenium. F. C. Smith, D. J. Bailey |