Message from the Program Chairs |
Symposium Committee |
Program Committee |
Access Control I |
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers / A. Herzberg ; Y. Mass ; J. Mihaeli ; D. Naor ; Y. Ravid |
A Security Infrastructure for Distributed Java Applications / D. Balfanz ; D. Dean ; M. Spreitzer |
A Practically Implementable and Tractable Delegation Logic / N. Li ; B. Grosof ; J. Feigenbaum |
Applications of Cryptography |
Practical Techniques for Searches on Encrypted Data / D. Song ; D. Wagner ; A. Perrig |
Efficient Authentication and Signing of Multicast Streams over Lossy Channels / R. Canetti ; D. Tygar |
Panel: Is Electronic Privacy Achievable? |
Is Electronic Privacy Achievable? / C. Irvine ; T. Levin |
Privacy Technology Lessons from Healthcare / R. Anderson |
Protocol Analysis and Design |
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols / J. Clark ; J. Jacob |
Authentication Tests / J. Guttman ; F. Thayer |
Protocol-Independent Secrecy / J. Millen ; H. Ruess |
Panel: Will Open Source Really Improve System Security? |
Robust Nonproprietary Software / P. Neumann |
Security and Source Code Access: Issues and Realities / S. Lipner |
Open Source in Security: Visiting the Bizarre / F. Schneider |
Will Openish Source Really Improve Security / G. McGraw |
Intrusion Detection |
Using Conservation of Flow as a Security Mechanism in Network Protocols / J. Hughes ; T. Aura ; M. Bishop |
Logic Induction of Valid Behavior Specifications for Intrusion Detection / C. Ko |
Assurance |
Using Model Checking to Analyze Network Vulnerabilities / R. Ritchey ; P. Ammann |
Verifying the EROS Confinement Mechanism / J. Shapiro ; S. Weber |
Fang: A Firewall Analysis Engine / A. Mayer ; A. Wool ; E. Ziskind |
Key Management |
A More Efficient Use of Delta-CRLs / D. Cooper |
An Efficient, Dynamic and Trust Preserving Public Key Infrastructure / A. Levi ; M. Caglayan |
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast / S. Setia ; S. Koussih ; S. Jajodia ; E. Harder |
Access Control II |
LOMAC: Low Water-Mark Integrity Protection for COTS Environments / T. Fraser |
IRM Enforcement of Java Stack Inspection / U. Erlingsson |
Author Index |
Message from the Program Chairs |
Symposium Committee |
Program Committee |
Access Control I |
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers / A. Herzberg ; Y. Mass ; J. Mihaeli ; D. Naor ; Y. Ravid |
A Security Infrastructure for Distributed Java Applications / D. Balfanz ; D. Dean ; M. Spreitzer |