| 1999 | A Secure Station for Network Monitoring and Control. Vassilis Prevelakis |
| 1999 | A Study in Using Neural Networks for Anomaly and Misuse Detection. Anup K. Ghosh, Aaron Schwartzbard |
| 1999 | Antigone: A Flexible Framework for Secure Group Communication. Patrick D. McDaniel, Atul Prakash, Peter Honeyman |
| 1999 | Brute Force Attack on UNIX Passwords with SIMD Computer. Gershon Kedem, Yuriko Ishihara |
| 1999 | Building Intrusion-Tolerant Applications. Thomas D. Wu, Michael Malkin, Dan Boneh |
| 1999 | Certificate-based Access Control for Widely Distributed Resources. Mary R. Thompson, William E. Johnston, Srilekha Mudumbai, Gary Hoo, Keith R. Jackson, Abdelilah Essiari |
| 1999 | Digital-Ticket-Controlled Digital Ticket Circulation. Ko Fujimura, Hiroshi Kuno, Masayuki Terada, Kazuo Matsuyama, Yasunao Mizuno, Jun Sekine |
| 1999 | Enforcing Well-Formed and Partially-Formed Transactions for UNIX. Dean Povey |
| 1999 | Hand-Held Computers Can Be Better Smart Cards. Dirk Balfanz, Edward W. Felten |
| 1999 | Jonah: Experience Implementing PKIX Reference Freeware. Mary Ellen Zurko, John Wray, Ian Morrison, Mike Shanzer, Mike Crane, Pat Booth, Ellen McDermott, Warren Macek, Ann Graham, Jim Wade, Tom Sandlin |
| 1999 | Offline Delegation. Arne Helme, Tage Stabell-Kulø |
| 1999 | Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999 G. Winfield Treese |
| 1999 | Scalable Access Control for Distributed Object Systems. Daniel F. Sterne, Gregg Tally, C. Durward McDonell, David L. Sherman, David Sames, Pierre X. Pasturel, E. John Sebes |
| 1999 | Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications. R. Sekar, Prem Uppuluri |
| 1999 | The Design and Analysis of Graphical Passwords. Ian Jermyn, Alain J. Mayer, Fabian Monrose, Michael K. Reiter, Aviel D. Rubin |
| 1999 | The Design of a Cryptographic Security Architecture. Peter Gutmann |
| 1999 | The Flask Security Architecture: System Support for Diverse Security Policies. Ray Spencer, Stephen Smalley, Peter A. Loscocco, Mike Hibler, Dave G. Andersen, Jay Lepreau |
| 1999 | Vaulted VPN: Compartmented Virtual Private Networks on Trusted Operating SystemsTse-Huong Choo, Hewlett-Packard Laboratories. Tse Huong Choo |
| 1999 | Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. Alma Whitten, J. Doug Tygar |