The Community for Technology Leaders
2012 IEEE Symposium on Security and Privacy (2000)
Berkeley, California
May 14, 2000 to May 17, 2000
ISSN: 1540-7993
ISBN: 0-7695-0665-8
Access Control I

Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers (Abstract)

Joris Michaeli , IBM Haifa Research Lab
Yiftach Ravid , IBM Haifa Research Lab
Yosi Mass , IBM Haifa Research Lab
Dalit Naor , IBM Almaden Research Lab
Amir Herzberg , IBM Haifa Research Lab
pp. 0002

A Security Infrastructure for Distributed Java Applications (Abstract)

Drew Dean , Xerox PARC
Mike Spreitzer , Xerox PARC
Dirk Balfanz , Princeton University
pp. 0015

A Practically Implementable and Tractable Delegation Logic (Abstract)

Benjamin Grosof , IBM T.J. Watson Research Center
Ninghui Li , New York University
Joan Feigenbaum , AT&T Labs
pp. 0027
Applications of Cryptography

Practical Techniques for Searches on Encrypted Data (Abstract)

Dawn Xiaodong Song , University of California at Berkeley
Adrian Perrig , University of California at Berkeley
David Wagner , University of California at Berkeley
pp. 0044

Efficient Authentication and Signing of Multicast Streams over Lossy Channels (Abstract)

Ran Canetti , IBM T.J. Watson
J.D. Tygar , University of California at Berkeley
Dawn Song , University of California at Berkeley
Adrian Perrig , University of California at Berkeley
pp. 0056

Is Electronic Privacy Achievable? (Abstract)

Timothy E. Levin , Anteon Corporation
Cynthia E. Irvine , Naval Postgraduate School
pp. 0076

Privacy Technology Lessons from Healthcare (Abstract)

Ross J. Anderson , Cambridge University
pp. 0078
Protocol Analysis and Design

Authentication Tests (Abstract)

F. Javier Thayer , The MITRE Corporation
Joshua D. Guttman , The MITRE Corporation
pp. 0096

Protocol-Independent Secrecy (Abstract)

Harald Rueß , SRI International
Jon Millen , SRI International
pp. 0110

Robust Nonproprietary Software (Abstract)

Peter G. Neumann , SRI International
pp. 0122

Will Openish Source Really Improve Security (Abstract)

Gary McGraw , Reliable Software Technologies
pp. 0128
Intrusion Detection

Using Conservation of Flow as a Security Mechanism in Network Protocols (Abstract)

Tuomas Aura , University of California at Davis
John R. Hughes , University of California at Davis
Matt Bishop , University of California at Davis
pp. 0132

Using Model Checking to Analyze Network Vulnerabilities (Abstract)

Paul Ammann , George Mason University
Ronald W. Ritchey , Booz Allen & Hamilton
pp. 0156

Verifying the EROS Confinement Mechanism (Abstract)

Jonathan S. Shapiro , IBM T.J. Watson Research Center
Sam Weber , IBM T.J. Watson Research Center
pp. 0166

Fang: A Firewall Analysis Engine (Abstract)

Avishai Wool , Lucent Technologies
Elisha Ziskind , Lucent Technologies
Alain Mayer , Lucent Technologies
pp. 0177
Key Management

A More Efficient Use of Delta-CRLs (Abstract)

David A. Cooper , National Institute of Standards and Technology
pp. 0190

An Efficient, Dynamic and Trust Preserving Public Key Infrastructure (Abstract)

M. Ufuk Caglayan , Bogazici University
Albert Levi , Bogazici University and Oregon State University
pp. 0203

Kronos: A Scalable Group Re-Keying Approach for Secure Multicast (Abstract)

Sanjeev Setia , George Mason University
Sushil Jajodia , George Mason University
Samir Koussih , George Mason University
Eric Harder , National Security Agency
pp. 0215
Access Control II

Author Index (PDF)

pp. 0256
101 ms
(Ver 3.3 (11022016))