| 1998 | A Comparison of Methods for Implementing Adaptive Security Policies. Brian Loe, Michael Carney |
| 1998 | A Java Beans Component Architecture for Cryptographic Protocols. Pekka Nikander, Arto Karila |
| 1998 | Attack-Resistant Trust Metrics for Public Key Certification. Raph Levien, Alex Aiken |
| 1998 | Bro: A System for Detecting Network Intruders in Real-Time. Vern Paxson |
| 1998 | Certificate Revocation and Certificate Update. Kobbi Nissim, Moni Naor |
| 1998 | Cryptographic Support for Secure Logs on Untrusted Machines. Bruce Schneier, John Kelsey |
| 1998 | Data Mining Approaches for Intrusion Detection. Wenke Lee, Salvatore J. Stolfo |
| 1998 | Expanding and Extending the Security Features of Java. Karen R. Sollins, Nimisha V. Mehta |
| 1998 | Finite-State Analysis of SSL 3.0. John C. Mitchell, Vitaly Shmatikov, Ulrich Stern |
| 1998 | Operating System Protection for Fine-Grained Programs. Trent Jaeger, Jochen Liedtke, Nayeem Islam |
| 1998 | Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, USA, January 26-29, 1998 Aviel D. Rubin |
| 1998 | Secure Videoconferencing. Peter Honeyman, Andy Adamson, Kevin Coffman, Janani Janakiraman, Rob Jerdonek, Jim Rees |
| 1998 | Securing Classical IP Over ATM Networks. Carsten Benecke, Uwe Ellermann |
| 1998 | Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies. Vinod Anupam, Alain J. Mayer |
| 1998 | Software Generation of Practically Strong Random Numbers. Peter Gutmann |
| 1998 | StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. Crispan Cowan |
| 1998 | The CRISIS Wide Area Security Architecture. Eshwar Belani, Amin Vahdat, Thomas E. Anderson, Michael Dahlin |
| 1998 | Towards Web Security Using PLASMA. Annette Krannig |
| 1998 | Unified Support for Heterogeneous Security Policies in Distributed Systems. Victoria Ungureanu, Naftaly H. Minsky |