| 1995 | 'TSUPDOOD?: Repackaged problems for you and MMI. Rebecca G. Bace, Marvin Schaefer |
| 1995 | Administration in a multiple policy/domain environment: the administration and melding of disparate policies. William R. Ford |
| 1995 | Applying the dependability paradigm to computer security. Catherine Meadows |
| 1995 | Credentials for privacy and interoperation. Vicki Ellen Jones, Neil Ching, Marianne Winslett |
| 1995 | Pretty good assurance. Jeffrey R. Williams, Marv Schaefer, Douglas J. Landoll |
| 1995 | Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, USA Hilary H. Hosmer, John E. Dobson, Catherine Meadows |
| 1995 | QuARC: expressive security mechanisms. John D. Yesberg, Mark S. Anderson |
| 1995 | Research issues in authorization models for hypertext systems. Elisa Bertino, Pierangela Samarati |
| 1995 | Security for infinite networks. Ruth Nelson, Hilary H. Hosmer |
| 1995 | Software system risk management and assurance. Sharon K. Fletcher, Roxana M. Jansma, Judy J. Lim, Ron Halbgewachs, Martin D. Murphy, Gregory D. Wyss |
| 1995 | Unhelpfulness as a security policy: or it's about time. Ruth Nelson |
| 1995 | Virtual enterprises and the enterprise security architecture. Tom Haigh |