Abstract is missing.
- Access Control Meets Public Key Infrastructure, Or: Assigning Roles to StrangersAmir Herzberg, Yosi Mass, Joris Mihaeli, Dalit Naor, Yiftach Ravid. 2-14 [doi]
- A Practically Implementable and Tractable Delegation LogicNinghui Li, Benjamin N. Grosof, Joan Feigenbaum. 27-42 [doi]
- Practical Techniques for Searches on Encrypted DataDawn Xiaodong Song, David Wagner, Adrian Perrig. 44-55 [doi]
- Efficient Authentication and Signing of Multicast Streams over Lossy ChannelsAdrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song. 56-73 [doi]
- Is Electronic Privacy Achievable?Cynthia E. Irvine, Timothy E. Levin. 76-77 [doi]
- Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure ProtocolsJohn A. Clark, Jeremy L. Jacob. 82-95 [doi]
- Authentication TestsJoshua D. Guttman, F. Javier Thayer. 96-109 [doi]
- Protocol-Independent SecrecyJonathan K. Millen, Harald Rueß. 110-209 [doi]
- Security and Source Code Access: Issues and RealitiesSteven B. Lipner. 124-125 [doi]
- Open Source in Security: Visiting the BizarreFred B. Schneider. 126-127 [doi]
- Will Openish Source Really Improve SecurityGary McGraw. 128-129 [doi]
- Using Conservation of Flow as a Security Mechanism in Network ProtocolsJohn R. Hughes, Tuomas Aura, Matt Bishop. 132-131 [doi]
- Logic Induction of Valid Behavior Specifications for Intrusion DetectionCalvin Ko. 142-153 [doi]
- Using Model Checking to Analyze Network VulnerabilitiesRonald W. Ritchey, Paul Ammann. 156-165 [doi]
- Verifying the EROS Confinement MechanismJonathan S. Shapiro, Sam Weber. 166-176 [doi]
- Fang: A Firewall Analysis EngineAlain J. Mayer, Avishai Wool, Elisha Ziskind. 177-187 [doi]
- A More Efficient Use of Delta-CRLsDavid A. Cooper. 190-202 [doi]
- An Efficient, Dynamic and Trust Preserving Public Key InfrastructureAlbert Levi, M. Ufuk Çaglayan. 203-214 [doi]
- Kronos: A Scalable Group Re-Keying Approach for Secure MulticastSanjeev Setia, Samir Koussih, Sushil Jajodia, Eric Harder. 215-228 [doi]
- LOMAC: Low Water-Mark Integrity Protection for COTS EnvironmentsTimothy Fraser. 230-245 [doi]
- IRM Enforcement of Java Stack InspectionÚlfar Erlingsson, Fred B. Schneider. 246-255 [doi]