| 2002 | 18th Annual Computer Security Applications Conference (ACSAC 2002), 9-13 December 2002, Las Vegas, NV, USA |
| 2002 | A Context-Aware Security Architecture for Emerging Applications. Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan, Mustaque Ahamad |
| 2002 | A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard. Andrew D. Marshall |
| 2002 | A Framework for Organisational Control Principles. Andreas Schaad, Jonathan D. Moffett |
| 2002 | A Model for Attribute-Based User-Role Assignment. Mohammad A. Al-Kahtani, Ravi S. Sandhu |
| 2002 | A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later. Richard A. Kemmerer |
| 2002 | A Secure Directory Service based on Exclusive Encryption. John R. Douceur, Atul Adya, Josh Benaloh, William J. Bolosky, Gideon Yuval |
| 2002 | A Security Architecture for Object-Based Distributed Systems. Bogdan C. Popescu, Maarten van Steen, Andrew S. Tanenbaum |
| 2002 | A Toolkit for Detecting and Analyzing Malicious Software. Michael Weber, Matthew Schmid, Michael Schatz, David Geyer |
| 2002 | Access Control for Active Spaces. Geetanjali Sampemane, Prasad Naldurg, Roy H. Campbell |
| 2002 | Advanced Features for Enterprise-Wide Role-Based Access Control. Axel Kern |
| 2002 | Architectures for Intrusion Tolerant Database Systems. Peng Liu |
| 2002 | Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. John Haggerty, Qi Shi, Madjid Merabti |
| 2002 | Composable Tools For Network Discovery and Security Analysis. Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer |
| 2002 | Controlled Physical Random Functions. Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas |
| 2002 | Detecting and Defending against Web-Server Fingerprinting. Dustin Lee, Jeff Rowe, Calvin Ko, Karl N. Levitt |
| 2002 | Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With A Security Decision. Mary Ellen Zurko, Charlie Kaufman, Katherine Spanbauer, Chuck Bassett |
| 2002 | Digging For Worms, Fishing For Answers. Florian P. Buchholz, Thomas E. Daniels, James P. Early, Rajeev Gopalakrishna, R. Patrick Gorman, Benjamin A. Kuperman, Sofie Nystrom, Addam Schroll, Andrew Smith |
| 2002 | Enforcing Resource Bound Safety for Mobile SNMP Agents. Weijiang Yu, Aloysius K. Mok |
| 2002 | Enterprise Engineering And Security: Enterprise Frameworks and Architectures, and IA Patterns. Duane Hybertson, A. Reedy, S. Chapin, M. Kirwan Jr. |
| 2002 | Evaluating the Impact of Automated Intrusion Response Mechanisms. Thomas Toth, Christopher Krügel |
| 2002 | GOSSIB vs. IP Traceback Rumors. Marcel Waldvogel |
| 2002 | Gender-Preferential Text Mining of E-mail Discourse. Malcolm Corney, Olivier Y. de Vel, Alison Anderson, George M. Mohay |
| 2002 | Intrusion Detection: Current Capabilities and Future Directions. Karl N. Levitt |
| 2002 | LOCK : An Historical Perspective. O. Sami Saydjari |
| 2002 | Malicious Code Detection for Open Firmware. Frank Adelstein, Matthew Stillerman, Dexter Kozen |
| 2002 | Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network. Michael Clifford |
| 2002 | Penetration Testing: A Duet. Daniel E. Geer Jr., John Harthorne |
| 2002 | Protecting Data from Malicious Software. Matthew Schmid, Frank Hill, Anup K. Ghosh |
| 2002 | Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption. Donghua Xu, Chenghuai Lu, André L. M. dos Santos |
| 2002 | Regulating E-Commerce through Certified Contracts. Victoria Ungureanu |
| 2002 | Representing TCP/IP Connectivity For Topological Analysis of Network Security. Ronald W. Ritchey, Brian O'Berry, Steven Noel |
| 2002 | Reusable Components for Developing Security-Aware Application. Stefan Probst, Wolfgang Eßmayr, Edgar R. Weippl |
| 2002 | Safe Virtual Execution Using Software Dynamic Translation. Kevin Scott, Jack W. Davidson |
| 2002 | Security Architecture of the Austrian Citizen Card Concept. Herbert Leitold, Arno Hollosi, Reinhard Posch |
| 2002 | Security of Internet Location Management. Tuomas Aura, Michael Roe, Jari Arkko |
| 2002 | Themes and Highlights of the New Security Paradigms Workshop 2002. Cristina Serban, O. Sami Saydjari |
| 2002 | Thirty Years Later: Lessons from the Multics Security Evaluation. Paul A. Karger, Roger R. Schell |
| 2002 | Throttling Viruses: Restricting propagation to defeat malicious mobile code. Matthew M. Williamson |
| 2002 | Voice over IPsec: Analysis and Solutions. Roberto Barbieri, Danilo Bruschi, Emilia Rosti |
| 2002 | Wireless Security: Vulnerabilities and Countermeasures. Dale M. Johnson |
| 2002 | With Gaming Technology towards Secure User Interfaces. Hanno Langweg |