paper 2: A Role-Based Delegation Model and Some Extensions
paper 3: Generalized Role-Based Access Control for Securing Future Applications
paper 2: The Cracker Patch Choice: An Analysis of Post Hoc Security Techniques
paper 3: Anti-Virus Software Testing for the New Millennium
paper 2: Penetration Analysis of a Xerox Docucenter DC 230ST: Assessing the Security of a Multi-Purpose Office Machine
paper 3: Analysis of Terminal Server Architectures for Thin Clients in a High Assurance Network
paper 2: Towards the Formal Modeling of a Secure Operating System
paper 3: The Open Platform Protection Profile (OP3): Taking the Common Criteria to the Outer Limits