| 2000 | 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA |
| 2000 | A Flexible Access Control Service for Java Mobile Code. Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Emil Lupu, Morris Sloman |
| 2000 | A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux. Thomas E. Daniels, Eugene H. Spafford |
| 2000 | A Novel Approach to On-Line Status Authentication of Public-Key Certificates. Eugenio Faldella, Marco Prandini |
| 2000 | A Policy-based Access Control Mechanism for the Corporate Web. Victoria Ungureanu, F. Vesuna, Naftaly H. Minsky |
| 2000 | A Reliable, Scalable General-Purpose Certificate Store. Peter Gutmann |
| 2000 | A Self-Extension Monitoring for Security Management. Heejin Jang, Sangwook Kim |
| 2000 | An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. Murat Aydos, Tugrul Yanik, Çetin Kaya Koç |
| 2000 | Applications in Health Care using Public-Key Certificates and Attribute Certificates. Petra Wohlmacher, Peter Pharow |
| 2000 | Binding Identities and Attributes using Digitally Signed Certificates. Joon S. Park, Ravi S. Sandhu |
| 2000 | Calculating Costs for Quality of Security Service. E. Spyropoulou, Timothy E. Levin, Cynthia E. Irvine |
| 2000 | Denial of Service Protection - The Nozzle. E. Strother |
| 2000 | Dynamic Access Control through Petri Net Workflows. Konstantin Knorr |
| 2000 | Efficient Commerce Protocols based on One-Time Pads. Michael A. Schneider, Edward W. Felten |
| 2000 | Enabling Secure On-Line DNS Dynamic Update. Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine |
| 2000 | Experience with Software Watermarking. Jens Palsberg, S. Krishnaswamy, Minseok Kwon, Di Ma, Qiuyun Shao, Y. Zhang |
| 2000 | Extending Java for Package based Access Control. John Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi |
| 2000 | Fair On-line Gambling. Weiliang Zhao, Vijay Varadharajan, Yi Mu |
| 2000 | Framework for Role-based Delegation Models. Ezedin Barka, Ravi S. Sandhu |
| 2000 | History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control. Reiner Sailer, Matthias Kabatnik |
| 2000 | ITS4: A Static Vulnerability Scanner for C and C++ Code. John Viega, J. T. Bloch, Y. Kohno, Gary McGraw |
| 2000 | Implementing Security Policies using the Safe Areas of Computation Approach. André L. M. dos Santos, Richard A. Kemmerer |
| 2000 | Introducing Decryption Authority into PKI. Feng Bao |
| 2000 | Layering Boundary Protections: An Experiment in Information Assurance. Dale M. Johnson, Lee A. Benzinger |
| 2000 | Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness. Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti |
| 2000 | On Computer Viral Infection and the Effect of Immunization. Chenxi Wang, John C. Knight, Matthew C. Elder |
| 2000 | Personal Security Environment on Palm PDA. Margus Freudenthal, Sven Heiberg, Jan Willemson |
| 2000 | Policy Mediation for Multi-Enterprise Environments. Pablo Galiasso, Oliver Bremer, John Hale, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu |
| 2000 | Policy-based Authentication and Authorization: Secure Access to the Network Infrastructure. Jeff Hayes |
| 2000 | Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? Kai Rannenberg, Giovanni Iachello |
| 2000 | Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI). Vishwa Prasad, Sreenivasa Potakamuri, Michael Ahern, Igor Balabine, Michah Lerner, Partha Dutta |
| 2000 | Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture. P. C. Clark, M. C. Meissner, K. O. Vance |
| 2000 | Secure Smart Homes using Jini and UIUC SESAME. Jalal Al-Muhtadi, Manish Anand, M. Dennis Mickunas, Roy H. Campbell |
| 2000 | Security Against Compelled Disclosure. Ian Brown, B. Laurie |
| 2000 | Security Agility in Response to Intrusion Detection. Michael J. Petkac, Lee Badger |
| 2000 | Security Architecture for Federated Cooperative Information Systems. Pierre Bieber, D. Raujol, Pierre Siron |
| 2000 | Security Architectures for Controlled Digital Information Dissemination. Jaehong Park, Ravi S. Sandhu, J. Schifalacqua |
| 2000 | The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip. Johann Großschädl |
| 2000 | Two State-based Approaches to Program-based Anomaly Detection. Christoph C. Michael, Anup K. Ghosh |
| 2000 | Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet. Uwe Jendricke, Daniela Gerd tom Markotten |
| 2000 | Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean |
| 2000 | Using Operating System Wrappers to Increase the Resiliency to Commercial Firewalls. Jeremy Epstein, Linda Thomas, Eric Monteith |
| 2000 | Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking. Germano Caronni, Sandeep Kumar, Christoph L. Schuba, Glenn Scott |