ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Information and System Security (TISSEC), Volume 7 Issue 4, November 2004

The predecessor attack: An analysis of a threat to anonymous communications systems
Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields
Pages: 489-522
DOI: 10.1145/1042031.1042032
There have been a number of protocols proposed for anonymous network communication. In this paper, we investigate attacks by corrupt group members that degrade the anonymity of each protocol over time. We prove that when a particular initiator...

A key-chain-based keying scheme for many-to-many secure group communication
Dijiang Huang, Deep Medhi
Pages: 523-552
DOI: 10.1145/1042031.1042033
We propose a novel secure group keying scheme using hash chain for many-to-many secure group communication. This scheme requires a key predistribution center to generate multiple hash chains and allocates exactly one hash value...

Client-side caching for TLS
Hovav Shacham, Dan Boneh, Eric Rescorla
Pages: 553-575
DOI: 10.1145/1042031.1042034
We propose two new mechanisms for caching handshake information on TLS clients. The "fast-track" mechanism provides a client-side cache of a server's public parameters and negotiated parameters in the course of an initial, enabling handshake. These...

Traducement: A model for record security
Tom Walcott, Matt Bishop
Pages: 576-590
DOI: 10.1145/1042031.1042035
Security models generally incorporate elements of both confidentiality and integrity. We examine a case where confidentiality is irrelevant to the process being modeled. In this case, integrity includes not only the authentication of origin and the...

Hypothesizing and reasoning about attacks missed by intrusion detection systems
Peng Ning, Dingbang Xu
Pages: 591-627
DOI: 10.1145/1042031.1042036
Several alert correlation methods have been proposed over the past several years to construct high-level attack scenarios from low-level intrusion alerts reported by intrusion detection systems (IDSs). However, all of these methods depend heavily on...