| 1996 | A credibility-based model of computer system security. Shaw-Cheng Chuang, Paul Wernick |
| 1996 | A new model of security for distributed systems. William A. Wulf, Chenxi Wang, Darrell M. Kienzle |
| 1996 | A new security policy for distributed resource management and access control. Steven J. Greenwald |
| 1996 | Access control in federated systems. Sabrina De Capitani di Vimercati, Pierangela Samarati |
| 1996 | Availability policies in an adversarial environment. Hilary H. Hosmer |
| 1996 | CAPSL: Common Authentication Protocol Specification Language. Jonathan K. Millen |
| 1996 | Developing and using a "policy neutral" access control policy. Duane E. Olawsky, Todd Fine, Edward A. Schneider, Ray Spencer |
| 1996 | Fortresses built upon sand. Dixie B. Baker |
| 1996 | Just sick about security. Jeff Williams |
| 1996 | Managing time for service and security. Ruth Nelson, Elizabeth Schwartz |
| 1996 | Positive feedback and the madness of crowds. Hilarie K. Orman, Richard Schroeppel |
| 1996 | Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA, September 17-20, 1996 Tom Haigh, Hilary H. Hosmer |
| 1996 | Run-time security evaluation: can we afford it? Cristina Serban, Bruce M. McMillin |
| 1996 | SafeBots: a paradigm for software security controls. Robert E. Filman, Ted Linden |
| 1996 | Simulated social control for secure Internet commerce. Lars Rasmusson, Sverker Janson |
| 1996 | The Emperor's old armor. Bob Blakley |
| 1996 | The right type of trust for distributed systems. Audun Jøsang |
| 1996 | User-centered security. Mary Ellen Zurko, Richard T. Simon |