Inductive Analysis of the Internet Protocol TLS / Lawrence C. Paulson |
Discussion |
External Consistency and the Veri cation of Security Protocols / Simon N. Foley |
The Trust Shell Game / Carl Ellison |
Overview of the AT&T Labs Trust-Management Project / Joan Feigenbaum |
KeyNote: Trust Management for Public-Key Infrastructures / Matt Blaze ; Angelos D. Keromytis |
Discussion - Trust Management |
Application-Oriented Security Policies and Their Composition / Virgil D. Gligor ; Serban I. Gavrila |
Secure Fingerprinting Using Public-Key Cryptography / Hiroshi Yoshiura ; Ryoichi Sasaki ; Kazuo Takaragi |
Third Party Certi cation of HTTP Service Access Statistics / Francesco Bergadano ; Pancrazio De Mauro |
Delegating Trust / William S. Harbison (Discussion) |
Delegation of Responsibility / Bruno Crispo |
Abuse of Process / Mark Lomas (Discussion) |
A New Concept in Protocols: Veri able Computational Delegation / Peter Landrock |
Delegation and Not-So Smart Cards / Bruce Christianson ; James A. Malcolm |
Certi cation and Delegation / Michael Roe (Discussion) |
Discussion - Di erences Between Academic and Commercial Security / Virgil Gligor ; Mark Lomas ; Raphael Yahalom ; John Warne |
Optimistic Trust with Realistic eNvestigators |
Insider Fraud / Dieter Gollmann |
Panel Session - Future Directions / Stewart Lee ; Roger Needham |
Contributor Index |
Inductive Analysis of the Internet Protocol TLS / Lawrence C. Paulson |
Discussion |
External Consistency and the Veri cation of Security Protocols / Simon N. Foley |
The Trust Shell Game / Carl Ellison |
Overview of the AT&T Labs Trust-Management Project / Joan Feigenbaum |
KeyNote: Trust Management for Public-Key Infrastructures / Matt Blaze ; Angelos D. Keromytis |