


default search action
21st S&P 2000: Oakland, California, USA
- 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000. IEEE Computer Society 2000, ISBN 0-7695-0665-8

Access Control I
- Amir Herzberg, Yosi Mass, Joris Mihaeli, Dalit Naor, Yiftach Ravid:

Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. 2-14 - Dirk Balfanz, Drew Dean, Mike Spreitzer:

A Security Infrastructure for Distributed Java Applications. 15-26 - Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum:

A Practically Implementable and Tractable Delegation Logic. 27-42
Applications of Cryptography
- Dawn Xiaodong Song, David A. Wagner, Adrian Perrig:

Practical Techniques for Searches on Encrypted Data. 44-55 - Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song:

Efficient Authentication and Signing of Multicast Streams over Lossy Channels. 56-73
Panel
- Cynthia E. Irvine, Timothy E. Levin:

Is Electronic Privacy Achievable? 76-77 - Ross J. Anderson:

Privacy Technology Lessons from Healthcare. 78-79
Protocol Analysis and Design
- John A. Clark, Jeremy L. Jacob:

Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols. 82-95 - Joshua D. Guttman, F. Javier Thayer:

Authentication Tests. 96-109 - Jonathan K. Millen, Harald Rueß:

Protocol-Independent Secrecy. 110-119
Panel
- Peter G. Neumann:

Robust Nonproprietary Software. 122-123 - Steven B. Lipner:

Security and Source Code Access: Issues and Realities. 124-125 - Fred B. Schneider:

Open Source in Security: Visiting the Bizarre. 126-127 - Gary McGraw:

Will Openish Source Really Improve Security. 128-129
Intrusion Detection
- John R. Hughes, Tuomas Aura, Matt Bishop

:
Using Conservation of Flow as a Security Mechanism in Network Protocols. 132-141 - Calvin Ko:

Logic Induction of Valid Behavior Specifications for Intrusion Detection. 142-153
Assurance
- Ronald W. Ritchey, Paul Ammann:

Using Model Checking to Analyze Network Vulnerabilities. 156-165 - Jonathan S. Shapiro, Sam Weber:

Verifying the EROS Confinement Mechanism. 166-176 - Alain J. Mayer, Avishai Wool

, Elisha Ziskind:
Fang: A Firewall Analysis Engine. 177-187
Key Management
- David A. Cooper:

A More Efficient Use of Delta-CRLs. 190-202 - Albert Levi, M. Ufuk Çaglayan

:
An Efficient, Dynamic and Trust Preserving Public Key Infrastructure. 203-214 - Sanjeev Setia, Samir Koussih, Sushil Jajodia, Eric Harder:

Kronos: A Scalable Group Re-Keying Approach for Secure Multicast. 215-228
Access Control II
- Timothy Fraser:

LOMAC: Low Water-Mark Integrity Protection for COTS Environments. 230-245 - Úlfar Erlingsson, Fred B. Schneider:

IRM Enforcement of Java Stack Inspection. 246-255

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














