Default Cover Image

Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001

May 14 2001 to May 16 2001

Oakland, California

ISSN: 1540-7993

ISBN: 0-7695-1046-9

Table of Contents

Message from the Program ChairsFreely available from IEEE.pp. vii
Symposium CommitteeFreely available from IEEE.pp. viii
Program CommitteeFreely available from IEEE.pp. ix
Session 1: Tamper-Resistance and Cryptography
Cryptographic Security for Mobile CodeFull-text access may be available. Sign in or learn about subscription options.pp. 0002
Session 1: Tamper-Resistance and Cryptography
Networked Cryptographic Devices Resilient to CaptureFull-text access may be available. Sign in or learn about subscription options.pp. 0012
Session 1: Tamper-Resistance and Cryptography
Protection of Keys against Modification AttackFull-text access may be available. Sign in or learn about subscription options.pp. 0026
Session 2: Intrusion and Anomaly Detection I
Data Mining Methods for Detection of New Malicious ExecutablesFull-text access may be available. Sign in or learn about subscription options.pp. 0038
Session 2: Intrusion and Anomaly Detection I
Evaluation of Intrusion Detectors: A Decision Theory ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 0050
Session 3: Information Flow
On Confidentiality and AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 0064
Session 3: Information Flow
Preserving Information Flow Properties under RefinementFull-text access may be available. Sign in or learn about subscription options.pp. 0078
Session 4: Access Control and Trust Management
Understanding Trust Management SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 0094
Session 4: Access Control and Trust Management
SD3: A Trust Management System with Certified EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 0106
Session 4: Access Control and Trust Management
Formal Treatment of Certificate Revocation Under Communal Access ControlFull-text access may be available. Sign in or learn about subscription options.pp. 0116
Session 5: Intrusion and Anomaly Detection II
Information-Theoretic Measures for Anomaly DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 0130
Session 5: Intrusion and Anomaly Detection II
A Fast Automaton-Based Method for Detecting Anomalous Program BehaviorsFull-text access may be available. Sign in or learn about subscription options.pp. 0144
Session 5: Intrusion and Anomaly Detection II
Intrusion Detection via Static AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 0156
Session 6: Cryptographic Protocols I
Performance of Public-Key-Enabled Kerberos Authentication in Large NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 0170
Session 6: Cryptographic Protocols I
A Model for Asynchronous Reactive Systems and its Application to Secure Message TransmissionFull-text access may be available. Sign in or learn about subscription options.pp. 0184
Session 7: What's Really Different
Cryptographic Key Generation from VoiceFull-text access may be available. Sign in or learn about subscription options.pp. 0202
Session 7: What's Really Different
A Trend Analysis of ExploitationsFull-text access may be available. Sign in or learn about subscription options.pp. 0214
Invited Talk
Reverse Engineering: A Legal Right or Wrong?Full-text access may be available. Sign in or learn about subscription options.pp. null
Session 8: Cryptographic Protocols II
Graph-Based Authentication of Digital StreamsFull-text access may be available. Sign in or learn about subscription options.pp. 0232
Session 8: Cryptographic Protocols II
ELK, a New Protocol for Efficient Large-Group Key DistributionFull-text access may be available. Sign in or learn about subscription options.pp. 0247
Session 8: Cryptographic Protocols II
Author IndexFreely available from IEEE.pp. 0263
Showing 25 out of 25