Default Cover Image

Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000

May 14 2000 to May 17 2000

Berkeley, California

ISSN: 1540-7993

ISBN: 0-7695-0665-8

Table of Contents

Message from the Program ChairsFreely available from IEEE.pp. vii
Symposium CommitteeFreely available from IEEE.pp. viii
Program CommitteeFreely available from IEEE.pp. ix
Access Control I
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to StrangersFull-text access may be available. Sign in or learn about subscription options.pp. 0002
Access Control I
A Security Infrastructure for Distributed Java ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 0015
Access Control I
A Practically Implementable and Tractable Delegation LogicFull-text access may be available. Sign in or learn about subscription options.pp. 0027
Applications of Cryptography
Practical Techniques for Searches on Encrypted DataFull-text access may be available. Sign in or learn about subscription options.pp. 0044
Applications of Cryptography
Efficient Authentication and Signing of Multicast Streams over Lossy ChannelsFull-text access may be available. Sign in or learn about subscription options.pp. 0056
Panel
Is Electronic Privacy Achievable?Full-text access may be available. Sign in or learn about subscription options.pp. 0076
Panel
Privacy Technology Lessons from HealthcareFull-text access may be available. Sign in or learn about subscription options.pp. 0078
Protocol Analysis and Design
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 0082
Protocol Analysis and Design
Authentication TestsFull-text access may be available. Sign in or learn about subscription options.pp. 0096
Protocol Analysis and Design
Protocol-Independent SecrecyFull-text access may be available. Sign in or learn about subscription options.pp. 0110
Panel
Robust Nonproprietary SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 0122
Panel
Security and Source Code Access: Issues and RealitiesFull-text access may be available. Sign in or learn about subscription options.pp. 0124
Panel
Open Source in Security: Visiting the BizarreFull-text access may be available. Sign in or learn about subscription options.pp. 0126
Panel
Will Openish Source Really Improve SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 0128
Intrusion Detection
Using Conservation of Flow as a Security Mechanism in Network ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 0132
Intrusion Detection
Logic Induction of Valid Behavior Specifications for Intrusion DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 0142
Assurance
Using Model Checking to Analyze Network VulnerabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 0156
Assurance
Verifying the EROS Confinement MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 0166
Assurance
Fang: A Firewall Analysis EngineFull-text access may be available. Sign in or learn about subscription options.pp. 0177
Key Management
A More Efficient Use of Delta-CRLsFull-text access may be available. Sign in or learn about subscription options.pp. 0190
Key Management
An Efficient, Dynamic and Trust Preserving Public Key InfrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 0203
Key Management
Kronos: A Scalable Group Re-Keying Approach for Secure MulticastFull-text access may be available. Sign in or learn about subscription options.pp. 0215
Access Control II
LOMAC: Low Water-Mark Integrity Protection for COTS EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 0230
Access Control II
IRM Enforcement of Java Stack InspectionFull-text access may be available. Sign in or learn about subscription options.pp. 0246
Access Control II
Author IndexFreely available from IEEE.pp. 0256
Showing 29 out of 29