5 works on record
Objects, agents, and features
Information Security Practice and Experience
Trustworthy Global Computing
Privacy vs. Security
Modeling and Verification of Parallel Processes