The Community for Technology Leaders
RSS Icon
Subscribe
2012 IEEE Symposium on Security and Privacy (2000)
Berkeley, California
May 14, 2000 to May 17, 2000
ISBN: 0-7695-0665-8
TABLE OF CONTENTS
pp. viii
Access Control I
Amir Herzberg , IBM Haifa Research Lab
Yosi Mass , IBM Haifa Research Lab
Joris Michaeli , IBM Haifa Research Lab
Yiftach Ravid , IBM Haifa Research Lab
Dalit Naor , IBM Almaden Research Lab
pp. 0002
Dirk Balfanz , Princeton University
Drew Dean , Xerox PARC
Mike Spreitzer , Xerox PARC
pp. 0015
Ninghui Li , New York University
Benjamin Grosof , IBM T.J. Watson Research Center
Joan Feigenbaum , AT&T Labs
pp. 0027
Applications of Cryptography
Dawn Xiaodong Song , University of California at Berkeley
David Wagner , University of California at Berkeley
Adrian Perrig , University of California at Berkeley
pp. 0044
Adrian Perrig , University of California at Berkeley
J.D. Tygar , University of California at Berkeley
Dawn Song , University of California at Berkeley
Ran Canetti , IBM T.J. Watson
pp. 0056
Panel
Cynthia E. Irvine , Naval Postgraduate School
Timothy E. Levin , Anteon Corporation
pp. 0076
Ross J. Anderson , Cambridge University
pp. 0078
Protocol Analysis and Design
Joshua D. Guttman , The MITRE Corporation
F. Javier Thayer , The MITRE Corporation
pp. 0096
Jon Millen , SRI International
Harald Rueß , SRI International
pp. 0110
Panel
Peter G. Neumann , SRI International
pp. 0122
Steven B. Lipner , Microsoft Corporation
pp. 0124
Fred B. Schneider , Cornell University
pp. 0126
Gary McGraw , Reliable Software Technologies
pp. 0128
Intrusion Detection
John R. Hughes , University of California at Davis
Tuomas Aura , University of California at Davis
Matt Bishop , University of California at Davis
pp. 0132
Assurance
Ronald W. Ritchey , Booz Allen & Hamilton
Paul Ammann , George Mason University
pp. 0156
Jonathan S. Shapiro , IBM T.J. Watson Research Center
Sam Weber , IBM T.J. Watson Research Center
pp. 0166
Alain Mayer , Lucent Technologies
Avishai Wool , Lucent Technologies
Elisha Ziskind , Lucent Technologies
pp. 0177
Key Management
David A. Cooper , National Institute of Standards and Technology
pp. 0190
Albert Levi , Bogazici University and Oregon State University
M. Ufuk Caglayan , Bogazici University
pp. 0203
Sanjeev Setia , George Mason University
Samir Koussih , George Mason University
Sushil Jajodia , George Mason University
Eric Harder , National Security Agency
pp. 0215
Access Control II
Author Index (PDF)
pp. 0256
14 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool