| 1997 | A distributed trust model. Alfarez Abdul-Rahman, Stephen Hailes |
| 1997 | A practical approach to security assessment. Darrell M. Kienzle, William A. Wulf |
| 1997 | A security model for dynamic adaptive traffic masking. Brenda Timmerman |
| 1997 | A tentative approach to constructing tamper-resistant software. Masahiro Mambo, Takanori Murayama, Eiji Okamoto |
| 1997 | An insecurity flow model. Ira S. Moskowitz, Myong H. Kang |
| 1997 | Integrating formalism and pragmatism: architectural security. Ruth Nelson |
| 1997 | Meta objects for access control: extending capability-based security. Thomas Riechmann, Franz J. Hauck |
| 1997 | Patterns of trust and policy. Daniel J. Essin |
| 1997 | Principles of a computer immune system. Anil Somayaji, Steven A. Hofmeyr, Stephanie Forrest |
| 1997 | Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom, September 23-26, 1997 Tom Haigh, Bob Blakley, Mary Ellen Zurko, Catherine Meodaws |
| 1997 | Protecting routing infrastructures from denial of service using cooperative intrusion detection. Steven Cheung, Karl N. Levitt |
| 1997 | Three paradigms in computer security. Catherine Meadows |
| 1997 | Under-specification, composition and emergent properties. Heather M. Hinton |