2000 IEEE Symposium on Security and Privacy, Page 2000
IEEE Computer Society, 2000 - Computers - 256 pages
Contains papers from a May 2000 symposium, covering all areas of computer security and electronic privacy. Papers were selected on the basis of scientific novelty, importance to the field, and technical quality. Material is in sections on access control, applications to cryptography, achievability of electronic privacy, protocol analysis and design, open source in security, intrusion detection, assurance, and key management. Specific topics include efficient authentication and signing of multicast streams over lossy channels, engineering tradeoffs and the evolution of provably secure protocols, and robust nonproprietary software. Lacks a subject index. Annotation copyrighted by Book News, Inc., Portland, OR.
What people are saying - Write a review
We haven't found any reviews in the usual places.
A Security Infrastructure for Distributed Java Applications
A Practically Implementable and Tractable Delegation Logic
Practical Techniques for Searches on Encrypted Data
17 other sections not shown
access control algorithm Alice allows application assumptions attack BAN logic base CRL call stack classical certificate clause component Computer Security cryptographic D1 LP defined delegates delta-CRLs encryption example execution exploit Figure firewall function goals hash host implementation initial Internet interval Iolus issued issuer Java kernel key management Kronos latency Lemma LOMAC Low Water-Mark model method multicast nested certificate path nested certificate propagation node NPKI objects open-box operations overhead packet loss perform pgrp principal privilege problem proof protocol pseudorandom pseudorandom function public key Public Key Infrastructure PublicWebServer query receiver reference monitor relying party request rate require router rule scheme Section security policy semantics sender server session key source code specific stack inspection statement strand subject certificate Symposium techniques Theorem threshold structures tion topology transformation trust UNIX valid verify vulnerabilities WATCHERS