| 1999 | A cursory examination of market forces driving the use of protection profiles. Kenneth G. Olthoff |
| 1999 | Discussion: strike back: offensive actions in information warfare. Donald J. Welch, Nathan Buchheit, Anthony Ruocco |
| 1999 | On the functional relation between security and dependability impairments. Erland Jonsson, Lars Strömberg, Stefan Lindskog |
| 1999 | Optimistic security: a new access control paradigm. Dean Povey |
| 1999 | Paradigm shifts in protocol analysis. Susan Pancho |
| 1999 | Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, ON, Canada, September 22-24, 1999 Darrell M. Kienzle, Mary Ellen Zurko, Steven J. Greenwald, Cristina Serbau |
| 1999 | Report on the discussion of "A cursory examination of market forces driving the common criteria". Kenneth G. Olthoff |
| 1999 | SASI enforcement of security policies: a retrospective. Úlfar Erlingsson, Fred B. Schneider |
| 1999 | Secure dynamic adaptive traffic masking. Brenda Timmerman |
| 1999 | Secure group management in large distributed systems: what is a group and what does it do? John McHugh, James Bret Michael |
| 1999 | Securing information transmission by redundancy. Jun Li, Peter L. Reiher, Gerald J. Popek |
| 1999 | Security architecture-based system design. Edward A. Schneider |
| 1999 | Security modeling in the COTS environment. Tom Markham, Dwight Colby, Mary Denz |
| 1999 | Security service level agreements: quantifiable security for the enterprise? Ronda R. Henning |
| 1999 | Survivability - a new technical and business perspective on security. Howard F. Lipson, David A. Fisher |
| 1999 | The high assurance brake job - a cautionary tale in five scenes. Kenneth G. Olthoff |