| 2000 | A Distributed Access Control Model for Java. Refik Molva, Yves Roudier |
| 2000 | A Formal Model for Role-Based Access Control Using Graph Transformation. Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce |
| 2000 | A Formal Semantics for SPKI. Jon Howell, David Kotz |
| 2000 | A Full Bandwidth ATM Firewall. Olivier Paul, Maryline Laurent, Sylvain Gombault |
| 2000 | A Security Framework for a Mobile Agent System. Ciarán Bryce |
| 2000 | A Typed Access Control Model for CORBA. Gerald Brose |
| 2000 | Analysing Time Dependent Security Properties in CSP Using PVS. Neil Evans, Steve A. Schneider |
| 2000 | Authentication and Confidentiality via IPSEC. Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer |
| 2000 | Automating Data Independence. Philippa J. Broadfoot, Gavin Lowe, A. W. Roscoe |
| 2000 | Checking Secure Interactions of Smart Card Applets. Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-Louis Lanet, Virginie Wiels, Guy Zanon |
| 2000 | Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner |
| 2000 | Finding a Connection Chain for Tracing Intruders. Kunikazu Yoda, Hiroaki Etoh |
| 2000 | Formal Verification of Cardholder Registration in SET. Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano |
| 2000 | How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications. Kai Rannenberg |
| 2000 | Metering Schemes for General Access Structures. Barbara Masucci, Douglas R. Stinson |
| 2000 | Safety Analysis of the Dynamic-Typed Access Matrix Model. Masakazu Soshi |
| 2000 | Secure Anonymous Signature-Based Transactions. Els Van Herreweghen |
| 2000 | Unwinding Possibilistic Security Properties. Heiko Mantel |
| 2000 | Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code. Ian Welch, Robert J. Stroud |
| 2000 | Verification of a Formal Security Model for Multiapplicative Smart Cards. Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll |