Contents
Message from the Program Chairs..........................vii
Symposium Committee............viii
Program Committee................ix
Access Control I
Access Control Meets Public Key
Infrastructure, Or: Assigning
Roles to Strangers.............2
A Security Infrastructure for
Distributed Java
Applications..................15
A Practically Implementable and
Tractable Delegation Logic....27
Applications of Cryptography
Practical Techniques for
Searches on Encrypted Data....44
Efficient Authentication and
Signing of Multicast Sterams
over Lossy Channels...........56
Panel: Is Electronic Privacy Achievable?
Is Electronic Privacy
Achievable?...................76
Privacy Technology Lessons from
Healthcare....................78
Protocol Analysis and Design
Searching for a Solution:
Engineering Tradeoffs and the
Evolution of Provably Secure
Protocols.....................82
Authentication Tests..........96
Protocol-Independent
Secrecy......................110
Panel: Will Open Source Really Improve System Security?
Robust Nonproprietary
Software.....................122
Security and Source Code
Access: Issues and
Realities....................124
Open Source in Security:
Visiting the Bizarre.........126
Will Open Source Really Improve
Security.....................128
Intrusion Detection
Using Conservation of Flow as a
Security Mechanism in Network
Protocols....................132
Logic Induction of Valid
Behavior Specifications for
Intrusion Detection..........142
Assurance
Using Model Checking to Analyze
Network Vulnerabilities......156
Verifying the EROS Confinement
Mechanism....................166
Fang: A Firewall Analysis
Engine.......................177
Key Management
A More Efficient Use of Delta-
CRLs.........................190
An Efficient, Dynamic and Trust
Preserving Public Key
Infrastructure...............203
Kronos: A Scalable Group Re-
Keying Approach for Secure
Multicast....................215
Access Control
LOMAC: Low Water-Mark Integrity
Protection for COTS
Environments.................230
IRM Enforcement of Java Stack
Inspection...................246
Author Index....................256
Keywords
Privacy, Open Source, LOMAC, Intrusion Detection