| 1998 | A Graph-based System for Network-vulnerability Analysis. Cynthia A. Phillips, Laura Painton Swiler |
| 1998 | A New Model for Availability in the Face of Self-Propagating Attacks. Meng-Jang Lin, Aleta Ricciardi, Keith Marzullo |
| 1998 | An Integrated Framework for Security and Dependability. Erland Jonsson |
| 1998 | Death, Taxes, and Imperfact Software: Surviving the Inevitable. Crispin Cowan, Calton Pu |
| 1998 | Discussion Topic: What is the Old Security Paradigm? Steven J. Greenwald |
| 1998 | Evaluating System Integrity. Simon N. Foley |
| 1998 | Meta Objects for Access Control: a Formal Model for Role-Based Principals. Thomas Riechmann, Franz J. Hauck |
| 1998 | Parsimonious Downgrading and Decision Trees Applied to the Inference Problem. Liwu Chang, Ira S. Moskowitz |
| 1998 | Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity Attacks. John P. McDermott |
| 1998 | Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998 Bob Blakley, Darrell M. Kienzle, Mary Ellen Zurko, Steven J. Greenwald |
| 1998 | Security Engineering in an Evolutionary Acquisition Environment. Marshall D. Abrams |
| 1998 | Server-Assisted Cryptography. Donald Beaver |
| 1998 | Tolerating Penetrations and Insider Attacks by Requiring Independent Corroboration. Clifford E. Kahn |
| 1998 | Toward a Secure System Engineering Methodolgy. Chris Slater, O. Sami Saydjari, Bruce Schneier, Jim Wallner |