ed Credential Chain Discovery in Trust Management - Extended Abstract............................... 35 N. Li, W. Winsborough, and J. Mitchell System Health and Intrusion Monitoring using a Hierarchy of Constraints ............................................. 51 C. Ko, P. Brutch, G. Tsafnat, J. Rowe, and K. Levitt LOMAC: MAC You Can Live With ........................................................................................................... 61 T. Fraser Autonomic Response to Distributed Denial of Service Attacks ............................................................... 75 D. Sterne, K. Djahandari, B. Wilson, B. Babson, D. Schnackenberg, H. Holliday, and T. Reid Security for Distributed Object-Oriented Systems................................................................................... 87 D. McDonell, G. Tally, D. Sames, and R. Lyda Genoa TIE, Advanced Boundary Controller Experiment....................................................................... 105 E. Montei...
Daniel F. Sterne, Kelly Djahandari, Brett Wilson,