| 1999 | 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA |
| 1999 | A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls. Rolf Oppliger, Andreas Greulich, Peter Trachsel |
| 1999 | A Language for Modeling Secure Business Transactions. Alexander W. Röhm, Gaby Herrmann, Günther Pernul |
| 1999 | A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning. Mahesh V. Tripunitara, Partha Dutta |
| 1999 | A Model of Certificate Revocation. David A. Cooper |
| 1999 | A Parallel Packet Screen for High Speed Networks. Carsten Benecke |
| 1999 | A Process State-Transition Analysis and Its Application to Intrusion Detection. Nittida Nuansri, Samar Singh, Tharam S. Dillon |
| 1999 | A Prototype Secure Workflow Server. Douglas L. Long, Julie Baker, Francis Fung |
| 1999 | A Resource Access Decision Service for CORBA-Based Distributed Systems. Konstantin Beznosov, Yi Deng, Bob Blakley, Carol C. Burt, John F. Barkley |
| 1999 | Adding Availability to Log Services of Untrusted Machines. Arianna Arona, Danilo Bruschi, Emilia Rosti |
| 1999 | An Application of Machine Learning to Network Intrusion Detection. Chris Sinclair, Lyn Pierce, Sara Matzner |
| 1999 | An Asynchronous Distributed Access Control Architecture for IP over ATM Networks. Olivier Paul, Maryline Laurent, Sylvain Gombault |
| 1999 | An Effective Defense Against First Party Attacks in Public-Key Algorithms. Stephen M. Matyas, Allen Roginsky |
| 1999 | Application-Level Isolation Using Data Inconsistency Detection. Amgad Fayad, Sushil Jajodia, Catherine D. McCollum |
| 1999 | Architecture and Concepts of the ARGuE Guard. Jeremy Epstein |
| 1999 | Design of LAN-Lock, A System for Securing Wireless Networks. Richard E. Newman, Mark V. Hoyt, Tim Swanson, Phillipe Broccard, Mark Sanders, Joe Winner |
| 1999 | Efficient Certificate Status Handling Within PKIs: An Application to Public Administration Services. Marco Prandini |
| 1999 | Fast Checking of Individual Certificate Revocation on Small Systems. Selwyn Russell |
| 1999 | Generic Support for PKIX Certificate Management in CDSA. Shabnam Erfani, C. Sekar Chandersekaran |
| 1999 | How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering). Ross J. Anderson |
| 1999 | Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum). Ron Ross, Cynthia E. Irvine, Charles Reynolds, Ravi S. Sandhu, Blaine Burnham, Rayford B. Vaughn |
| 1999 | Legal and Technical Responses to Protecting the U. S. Critical Infrastructures (Panel). Arthur D. Friedman, Ellie Padgett, Mark Rasch, Scott Charney, John Thomas |
| 1999 | Modular Fair Exchange Protocols for Electronic Commerce. Holger Vogt, Henning Pagnia, Felix C. Gärtner |
| 1999 | Napoleon: A Recipe for Workflow. Charles N. Payne, D. J. Thomsen, J. Bogle, Richard C. O'Brien |
| 1999 | Non-repudiation Evidence Generation for CORBA using XML. Michael Wichert, David B. Ingham, Steve J. Caughey |
| 1999 | Policy-Based Management: Bridging the Gap. Susan Hinrichs |
| 1999 | SAM: Security Adaptation Manager . Heather M. Hinton, Crispin Cowan, Lois M. L. Delcambre, Shawn Bowers |
| 1999 | SCR: A Practical Approach to Building a High Assurance COMSEC System. James Kirby, Myla Archer, Constance L. Heitmeyer |
| 1999 | Safe Areas of Computation for Secure Computing with Insecure Applications. André L. M. dos Santos, Richard A. Kemmerer |
| 1999 | SecurSight: An Architecture for Secure Information Access. John G. Brainard |
| 1999 | Secure Communications in ATM Networks. Maryline Laurent, Ahmed Bouabdallah, Christophe Delahaye, Herbert Leitold, Reinhard Posch, Enrique Areizaga, Juàn Manuel Mateos |
| 1999 | Security Architecture Development and Results for a Distributed Modeling and Simulation System . Richard B. Neely |
| 1999 | Security Policy Coordination for Heterogeneous Information Systems. John Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi |
| 1999 | Security Relevancy Analysis on the Registry of Windows NT 4.0. Wenliang Du, Praerit Garg, Aditya P. Mathur |
| 1999 | The ARBAC99 Model for Administration of Roles. Ravi S. Sandhu, Qamar Munawer |
| 1999 | Tools to Support Secure Enterprise Computing. Myong H. Kang, Brian J. Eppinger, Judith N. Froscher |
| 1999 | Toward a Taxonomy and Costing Method for Security Services. Cynthia E. Irvine, Timothy E. Levin |
| 1999 | Towards a Practical, Secure, and Very Large Scale Online Election. Jared Karro, Jie Wang |
| 1999 | Transactions in Java Card. Marcus Oestreicher |
| 1999 | TrustedBox: A Kernel-Level Integrity Checker. Pietro Iglio |
| 1999 | Trustworthy Access Control with Untrustworthy Web Servers. Tim Wilkinson, Dave Hearn, Simon R. Wiseman |
| 1999 | User Authentication and Authorization in the Java(tm) Platform. Charlie Lai, Li Gong, Larry Koved, Anthony J. Nadalin, Roland Schemers |
| 1999 | Using Abuse Case Models for Security Requirements Analysis. John P. McDermott, Chris Fox |
| 1999 | Using Checkable Types in Automatic Protocol Analysis. Stephen H. Brackin |