Abstract is missing.
- Inductive Analysis of the Internet Protocol TLS (Position Paper)Lawrence C. Paulson. 1-12 [doi]
- Inductive Analysis of the Internet Protocol TLS (Transcript of Discussion)Lawrence C. Paulson. 13-23 [doi]
- External Consistency and the Verification of Security Protocols (Position Paper)Simon N. Foley. 24-27 [doi]
- External Consistency and the Verification of Security Protocols (Transcript of Discussion)Simon N. Foley. 28-35 [doi]
- The Trust Shell Game (Position Paper)Carl M. Ellison. 36-40 [doi]
- The Trust Shell Game (Transcript of Discussion)Carl M. Ellison. 41-44 [doi]
- Overview of the AT&T Labs Trust-Management Project (Position Paper)Joan Feigenbaum. 45-50 [doi]
- Overview of the AT&T Labs Trust-Management Project (Transcript of Discussion)Joan Feigenbaum. 51-58 [doi]
- KeyNote: Trust Management for Public-Key Infrastructures (Position Paper)Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis. 59-63 [doi]
- Discussion Session - Trust Management64-63 [doi]
- Application-Oriented Security Policies and Their Composition (Position Paper)Virgil D. Gligor, Serban I. Gavrila. 67-74 [doi]
- Application-Oriented Security Policies and Their Composition (Transcript of Discussion)Virgil D. Gligor. 75-82 [doi]
- Secure Fingerprinting Using Public-Key Cryptography (Position Paper)Hiroshi Yoshiura, Ryoichi Sasaki, Kazuo Takaragi. 83-89 [doi]
- Secure Fingerprinting Using Public-Key Cryptography (Transcript of Discussion)RyƓichi Sasaki. 90-94 [doi]
- Third Party Certification of HTTP Service Access Statistics (Position Paper)Francesco Bergadano, P. De Mauro. 95-99 [doi]
- Third Party Certification of HTTP Service Access Statistics (Transcript of Discussion)Francesco Bergadano. 100-107 [doi]
- Delegating Trust (Transcript of Discussion)William S. Harbison. 108-117 [doi]
- Delegation of Responsibility (Position Paper)Bruno Crispo. 118-124 [doi]
- Delegation of Responsibility (Transcript of Discussion)Bruno Crispo. 125-130 [doi]
- Abuse of Process (Transcript of Discussion)T. Mark A. Lomas. 131-136 [doi]
- A New Concept in Protocols: Verifiable Computational Delegation (Position Paper)Peter Landrock. 137-145 [doi]
- A New Concept in Protocols: Verifiable Computational Delegation (Transcript of Discussion)Peter Landrock. 146-153 [doi]
- Delegation and Not-So Smart Cards (Position Paper)Bruce Christianson, James A. Malcolm. 154-157 [doi]
- Delegation and Not-So Smart Card (Transcript of Discussion)Bruce Christianson. 158-167 [doi]
- Certification and Delegation (Transcript of Discussion)Michael Roe. 168-176 [doi]
- Discussion Session: Differences Between Academic and Commercial SecurityVirgil D. Gligor, Peter Landrock, T. Mark A. Lomas, Raphael Yahalom, John P. Warne. 177-192 [doi]
- Optimistic Trust with Realistic ::::e::::Nvestigators (Position Paper)Raphael Yahalom. 193-202 [doi]
- Optimistic Trust with Realistic ::::e::::Nvestigators (Transcript of Discussion)Raphael Yahalom. 203-212 [doi]
- Insider Fraud (Position Paper)Dieter Gollmann. 213-219 [doi]
- Insider Fraud (Transcript of Discussion)Dieter Gollmann. 220-226 [doi]
- Panel Session - Future DirectionsRoger M. Needham, E. Stewart Lee, Joan Feigenbaum, Virgil D. Gligor, Bruce Christianson. 227-239 [doi]