The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

2000 IEEE Symposium on Security and Privacy

Download

Download PDF Document
PDF

Author

IEEE Computer Society

Tech report number

CERIAS TR 2003-57

Entry type

proceedings

Download

PDF

Date

2000

Key alpha

IEEE

Publisher

IEEE

Publication Date

0000-00-00

Contents

Message from the Program Chairs..........................vii Symposium Committee............viii Program Committee................ix Access Control I Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers.............2 A Security Infrastructure for Distributed Java Applications..................15 A Practically Implementable and Tractable Delegation Logic....27 Applications of Cryptography Practical Techniques for Searches on Encrypted Data....44 Efficient Authentication and Signing of Multicast Sterams over Lossy Channels...........56 Panel: Is Electronic Privacy Achievable? Is Electronic Privacy Achievable?...................76 Privacy Technology Lessons from Healthcare....................78 Protocol Analysis and Design Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols.....................82 Authentication Tests..........96 Protocol-Independent Secrecy......................110 Panel: Will Open Source Really Improve System Security? Robust Nonproprietary Software.....................122 Security and Source Code Access: Issues and Realities....................124 Open Source in Security: Visiting the Bizarre.........126 Will Open Source Really Improve Security.....................128 Intrusion Detection Using Conservation of Flow as a Security Mechanism in Network Protocols....................132 Logic Induction of Valid Behavior Specifications for Intrusion Detection..........142 Assurance Using Model Checking to Analyze Network Vulnerabilities......156 Verifying the EROS Confinement Mechanism....................166 Fang: A Firewall Analysis Engine.......................177 Key Management A More Efficient Use of Delta- CRLs.........................190 An Efficient, Dynamic and Trust Preserving Public Key Infrastructure...............203 Kronos: A Scalable Group Re- Keying Approach for Secure Multicast....................215 Access Control LOMAC: Low Water-Mark Integrity Protection for COTS Environments.................230 IRM Enforcement of Java Stack Inspection...................246 Author Index....................256

Copyright

2000, IEEE

Isbn

0-7695-0665-8

Issn

1081-6011

Keywords

Privacy, Open Source, LOMAC, Intrusion Detection

Language

English

BibTex-formatted data

To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.