Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 8 Issue 1, February 2005

Ravi Sandhu
Pages: 1-1
DOI: 10.1145/1053283.1053284

Vijay Atluri
Pages: 2-2
DOI: 10.1145/1053283.1053285

Randomized instruction set emulation
Elena Gabriela Barrantes, David H. Ackley, Stephanie Forrest, Darko Stefanović
Pages: 3-40
DOI: 10.1145/1053283.1053286
Injecting binary code into a running program is a common form of attack. Most defenses employ a “guard the doors” approach, blocking known mechanisms of code injection. Randomized instruction set emulation (RISE) is a complementary...

Establishing pairwise keys in distributed sensor networks
Donggang Liu, Peng Ning, Rongfang Li
Pages: 41-77
DOI: 10.1145/1053283.1053287
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. However, due to the resource constraints on sensor nodes, it is not...

Incentive-based modeling and inference of attacker intent, objectives, and strategies
Peng Liu, Wanyu Zang, Meng Yu
Pages: 78-118
DOI: 10.1145/1053283.1053288
Although the ability to model and infer attacker intent, objectives, and strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predictive or proactive cyber defense, existing AIOS inference techniques are...

Modeling and assessing inference exposure in encrypted databases
Alberto Ceselli, Ernesto Damiani, Sabrina De Capitani Di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
Pages: 119-152
DOI: 10.1145/1053283.1053289
The scope and character of today's computing environments are progressively shifting from traditional, one-on-one client-server interaction to the new cooperative paradigm. It then becomes of primary importance to provide means of protecting the...