Paper Recommendation
1987 An intrusion-Detection Model

1996 A Secure Environment For Untrusted Helper Applications Confining The Wily Hacker

1986 A Global Authentication Service Without Global Trust

1994 Access Control: Principles and Practice

2003 Role-Based Access Control

1999 Multicast Security: A Taxonomy and Some Efficient Constructions

2000 Automated Trust Negotiation

1996 Role-based Access Control Models

2001 Why information Security Is Hard - An Economic Perspective

1988 The Algebra of Security

2002 Throughput and Delay Limits of IEEE 802.11

1978 Issues in Packet-network interconnection

2000 Architectural Support For Copy and Tamper Resistant Software

2003 Interworking Architecture Between 3GPP and WLAN Systems

1984 A High Performance Encryption Algorithm

1990 Federated Database Systems For Managing Distributed, Heterogeneous, and Autonomous Databases

1994 Access Control: Principle and Practice

2000 REUNITE: A Recursive Unicast Approach To Multicast

1989 The Cuckoo's Egg

2003 Extensible Access Control Markup Language (xacml)