| 2000 | A modular approach to composing access control policies. Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati |
| 2000 | A protocol for anonymous communication over the Internet. Clay Shields, Brian Neil Levine |
| 2000 | A secure execution framework for Java. Manfred Hauswirth, Clemens Kerer, Roman Kurmanowytsch |
| 2000 | Accountable certificate management using undeniable attestations. Ahto Buldas, Peeter Laud, Helger Lipmaa |
| 2000 | An access control model for simplifying constraint expression. Jonathon Tidswell, Trent Jaeger |
| 2000 | An authorization model for temporal data. Avigdor Gal, Vijayalakshmi Atluri |
| 2000 | CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000. Dimitris Gritzalis, Sushil Jajodia, Pierangela Samarati |
| 2000 | Composition and integrity preservation of secure reactive systems. Birgit Pfitzmann, Michael Waidner |
| 2000 | Cross-domain one-shot authorization using smart cards. Richard Au, Mark Looi, Paul Ashley |
| 2000 | Distribution chain security. Glenn Durfee, Matthew K. Franklin |
| 2000 | Efficient fault-tolerant certificate revocation. Rebecca N. Wright, Patrick Lincoln, Jonathan K. Millen |
| 2000 | Electronic payment technologies. Yair Frankel |
| 2000 | Evaluating certificate status information mechanisms. John Iliadis, Diomidis Spinellis, Dimitris Gritzalis, Bart Preneel, Sokratis K. Katsikas |
| 2000 | Funkspiel schemes: an alternative to conventional tamper resistance. Johan Håstad, Jakob Jonsson, Ari Juels, Moti Yung |
| 2000 | Implementing a distributed firewall. Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith |
| 2000 | Moiré cryptography. Yvo Desmedt, Tri Van Le |
| 2000 | Multi-round passive attacks on server-aided RSA protocols. Johannes Merkle |
| 2000 | Network security and IPsec (tutorial). John Ioannidis, Angelos D. Keromytis |
| 2000 | New constructions for multicast re-keying schemes using perfect hash families. Reihaneh Safavi-Naini, Huaxiong Wang |
| 2000 | Operating system enhancements to prevent the misuse of system calls. Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini |
| 2000 | PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet. Ting Yu, Xiaosong Ma, Marianne Winslett |
| 2000 | Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP. Yuji Watanabe, Hideki Imai |
| 2000 | Regulating service access and information release on the Web. Piero A. Bonatti, Pierangela Samarati |
| 2000 | Security enhanced mobile agents. Vijay Varadharajan |
| 2000 | Security: the state of the practice (invited talk). Ravi Ganesan |
| 2000 | Simple and fault-tolerant key agreement for dynamic collaborative groups. Yongdae Kim, Adrian Perrig, Gene Tsudik |
| 2000 | Simple forward-secure signatures from any signature scheme. Hugo Krawczyk |
| 2000 | Threshold-based identity recovery for privacy enhanced applications. Joachim Biskup, Ulrich Flegel |
| 2000 | Timing attacks on Web privacy. Edward W. Felten, Michael A. Schneider |
| 2000 | User privacy issues regarding certificates and the TLS protocol: the design and implementation of the SPSL protocol. Pino Persiano, Ivan Visconti |
| 2000 | Using router stamping to identify the source of IP packets. Thomas W. Doeppner Jr., Philip N. Klein, Andrew Koyfman |
| 2000 | Which PKI (public key infrastructure) is the right one? (panel session). Carlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip R. Zimmermann |
| 2000 | XML document security based on provisional authorization. Michiharu Kudo, Satoshi Hada |