CCS A*

33 papers

YearTitle / Authors
2000A modular approach to composing access control policies.
Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati
2000A protocol for anonymous communication over the Internet.
Clay Shields, Brian Neil Levine
2000A secure execution framework for Java.
Manfred Hauswirth, Clemens Kerer, Roman Kurmanowytsch
2000Accountable certificate management using undeniable attestations.
Ahto Buldas, Peeter Laud, Helger Lipmaa
2000An access control model for simplifying constraint expression.
Jonathon Tidswell, Trent Jaeger
2000An authorization model for temporal data.
Avigdor Gal, Vijayalakshmi Atluri
2000CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000.
Dimitris Gritzalis, Sushil Jajodia, Pierangela Samarati
2000Composition and integrity preservation of secure reactive systems.
Birgit Pfitzmann, Michael Waidner
2000Cross-domain one-shot authorization using smart cards.
Richard Au, Mark Looi, Paul Ashley
2000Distribution chain security.
Glenn Durfee, Matthew K. Franklin
2000Efficient fault-tolerant certificate revocation.
Rebecca N. Wright, Patrick Lincoln, Jonathan K. Millen
2000Electronic payment technologies.
Yair Frankel
2000Evaluating certificate status information mechanisms.
John Iliadis, Diomidis Spinellis, Dimitris Gritzalis, Bart Preneel, Sokratis K. Katsikas
2000Funkspiel schemes: an alternative to conventional tamper resistance.
Johan Håstad, Jakob Jonsson, Ari Juels, Moti Yung
2000Implementing a distributed firewall.
Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith
2000Moiré cryptography.
Yvo Desmedt, Tri Van Le
2000Multi-round passive attacks on server-aided RSA protocols.
Johannes Merkle
2000Network security and IPsec (tutorial).
John Ioannidis, Angelos D. Keromytis
2000New constructions for multicast re-keying schemes using perfect hash families.
Reihaneh Safavi-Naini, Huaxiong Wang
2000Operating system enhancements to prevent the misuse of system calls.
Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini
2000PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet.
Ting Yu, Xiaosong Ma, Marianne Winslett
2000Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP.
Yuji Watanabe, Hideki Imai
2000Regulating service access and information release on the Web.
Piero A. Bonatti, Pierangela Samarati
2000Security enhanced mobile agents.
Vijay Varadharajan
2000Security: the state of the practice (invited talk).
Ravi Ganesan
2000Simple and fault-tolerant key agreement for dynamic collaborative groups.
Yongdae Kim, Adrian Perrig, Gene Tsudik
2000Simple forward-secure signatures from any signature scheme.
Hugo Krawczyk
2000Threshold-based identity recovery for privacy enhanced applications.
Joachim Biskup, Ulrich Flegel
2000Timing attacks on Web privacy.
Edward W. Felten, Michael A. Schneider
2000User privacy issues regarding certificates and the TLS protocol: the design and implementation of the SPSL protocol.
Pino Persiano, Ivan Visconti
2000Using router stamping to identify the source of IP packets.
Thomas W. Doeppner Jr., Philip N. Klein, Andrew Koyfman
2000Which PKI (public key infrastructure) is the right one? (panel session).
Carlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip R. Zimmermann
2000XML document security based on provisional authorization.
Michiharu Kudo, Satoshi Hada