The Community for Technology Leaders
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000 (2000)
Berkeley, California
May 14, 2000 to May 17, 2000
ISSN: 1540-7993
ISBN: 0-7695-0665-8
Access Control I

Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers (Abstract)

Amir Herzberg , IBM Haifa Research Lab
Yosi Mass , IBM Haifa Research Lab
Joris Michaeli , IBM Haifa Research Lab
Yiftach Ravid , IBM Haifa Research Lab
Dalit Naor , IBM Almaden Research Lab
pp. 0002

A Security Infrastructure for Distributed Java Applications (Abstract)

Dirk Balfanz , Princeton University
Drew Dean , Xerox PARC
Mike Spreitzer , Xerox PARC
pp. 0015

A Practically Implementable and Tractable Delegation Logic (Abstract)

Ninghui Li , New York University
Benjamin Grosof , IBM T.J. Watson Research Center
Joan Feigenbaum , AT&T Labs
pp. 0027
Applications of Cryptography

Practical Techniques for Searches on Encrypted Data (Abstract)

Dawn Xiaodong Song , University of California at Berkeley
David Wagner , University of California at Berkeley
Adrian Perrig , University of California at Berkeley
pp. 0044

Efficient Authentication and Signing of Multicast Streams over Lossy Channels (Abstract)

Adrian Perrig , University of California at Berkeley
J.D. Tygar , University of California at Berkeley
Dawn Song , University of California at Berkeley
Ran Canetti , IBM T.J. Watson
pp. 0056

Is Electronic Privacy Achievable? (Abstract)

Cynthia E. Irvine , Naval Postgraduate School
Timothy E. Levin , Anteon Corporation
pp. 0076

Privacy Technology Lessons from Healthcare (Abstract)

Ross J. Anderson , Cambridge University
pp. 0078
Protocol Analysis and Design

Authentication Tests (Abstract)

Joshua D. Guttman , The MITRE Corporation
F. Javier Thayer , The MITRE Corporation
pp. 0096

Protocol-Independent Secrecy (Abstract)

Jon Millen , SRI International
Harald Rueß , SRI International
pp. 0110

Robust Nonproprietary Software (Abstract)

Peter G. Neumann , SRI International
pp. 0122

Will Openish Source Really Improve Security (Abstract)

Gary McGraw , Reliable Software Technologies
pp. 0128
Intrusion Detection

Using Conservation of Flow as a Security Mechanism in Network Protocols (Abstract)

John R. Hughes , University of California at Davis
Tuomas Aura , University of California at Davis
Matt Bishop , University of California at Davis
pp. 0132

Using Model Checking to Analyze Network Vulnerabilities (Abstract)

Ronald W. Ritchey , Booz Allen & Hamilton
Paul Ammann , George Mason University
pp. 0156

Verifying the EROS Confinement Mechanism (Abstract)

Jonathan S. Shapiro , IBM T.J. Watson Research Center
Sam Weber , IBM T.J. Watson Research Center
pp. 0166

Fang: A Firewall Analysis Engine (Abstract)

Alain Mayer , Lucent Technologies
Avishai Wool , Lucent Technologies
Elisha Ziskind , Lucent Technologies
pp. 0177
Key Management

A More Efficient Use of Delta-CRLs (Abstract)

David A. Cooper , National Institute of Standards and Technology
pp. 0190

An Efficient, Dynamic and Trust Preserving Public Key Infrastructure (Abstract)

Albert Levi , Bogazici University and Oregon State University
M. Ufuk Caglayan , Bogazici University
pp. 0203

Kronos: A Scalable Group Re-Keying Approach for Secure Multicast (Abstract)

Sanjeev Setia , George Mason University
Samir Koussih , George Mason University
Sushil Jajodia , George Mason University
Eric Harder , National Security Agency
pp. 0215
Access Control II

Author Index (PDF)

pp. 0256
86 ms
(Ver 3.3 (11022016))