Abstract is missing.
- Access Control in an Open Distributed EnvironmentRichard Hayton, Jean Bacon, Ken Moody. 3-14 [doi]
- Ensuring Continuity During Dynamic Security Policy Reconfiguration in DTETimothy Fraser, Lee Badger. 15-26 [doi]
- Composing Partially-Specified SystemsHeather M. Hinton. 27-37 [doi]
- Secure Execution of Java Applets using a Remote PlaygroundDahlia Malkhi, Michael K. Reiter, Aviel D. Rubin. 40-51 [doi]
- Understanding Java Stack InspectionDan S. Wallach, Edward W. Felten. 52-63 [doi]
- Efficient Key Distribution for Slow Computing Devices: Achieving Fast Over the Air Activation for Wireless SystemsChris Carroll, Yair Frankel, Yiannis Tsiounis. 66-76 [doi]
- Efficient and Practical Fair Exchange Protocols with Off-Line TTPFeng Bao, Robert H. Deng, Wenbo Mao. 77-85 [doi]
- Asynchronous Protocols for Optimistic Fair ExchangeN. Asokan, Victor Shoup, Michael Waidner. 86-99 [doi]
- An Automated Approach for Identifying Potential Vulnerabilities in SoftwareAnup K. Ghosh, Tom O Connor, Gary McGraw. 104-114 [doi]
- Detecting Disruptive Routers: A Distributed Network Monitoring ApproachKirk A. Bradley, Steven Cheung, Nicholas J. Puketza, Biswanath Mukherjee, Ronald A. Olsson. 115-124 [doi]
- Timing Attacks Against Trusted PathJonathan T. Trostle. 125-134 [doi]
- Partial Security Policies to Support Timeliness in Secure Real-Time DatabasesSang Hyuk Son, Craig Chaney, Norris P. Thomlinson. 136-147 [doi]
- On Enabling Secure Applications Through Off-Line Biometric IdentificationGeorge I. Davida, Yair Frankel, Brian J. Matt. 148-157 [doi]
- Strand Spaces: Why is a Security Protocol Correct?F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman. 160-171 [doi]
- On the Formal Definition of Separation-of-Duty Policies and their CompositionVirgil D. Gligor, Serban I. Gavrila, David F. Ferraiolo. 172-183 [doi]
- Complete, Safe Information Flow with Decentralized LabelsAndrew C. Myers, Barbara Liskov. 186-197 [doi]
- Stack and Queue Integrity on Hostile PlatformsPremkumar T. Devanbu, Stuart G. Stubblebine. 198-206 [doi]
- Necessity and Realization of Universally Verifiable Secret SharingWenbo Mao. 208-214 [doi]
- Towards Mobile CryptographyTomas Sander, Christian F. Tschudin. 215-224 [doi]