ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Information and System Security (TISSEC), Volume 9 Issue 2, May 2006

An effective role administration model using organization structure
Sejong Oh, Ravi Sandhu, Xinwen Zhang
Pages: 113-137
DOI: 10.1145/1151414.1151415
Role-based access control (RBAC) is a well-accepted model for access control in an enterprise environment. When we apply RBAC model to large enterprises, effective role administration is a major issue. ARBAC97 is a well-known solution for...

Accountability protocols: Formalized and verified
Giampaolo Bella, Lawrence C. Paulson
Pages: 138-161
DOI: 10.1145/1151414.1151416
Classical security protocols aim to achieve authentication and confidentiality under the assumption that the peers behave honestly. Some recent protocols are required to achieve their goals even if the peer misbehaves. Accountability is a...

Battery power-aware encryption
R. Chandramouli, S. Bapatla, K. P. Subbalakshmi, R. N. Uma
Pages: 162-180
DOI: 10.1145/1151414.1151417
Minimizing power consumption is crucial in battery power-limited secure wireless mobile networks. In this paper, we (a) introduce a hardware/software set-up to measure the battery power consumption of encryption algorithms through real-life...

A framework for password-based authenticated key exchange1
Rosario Gennaro, Yehuda Lindell
Pages: 181-234
DOI: 10.1145/1151414.1151418
In this paper, we present a general framework for password-based authenticated key exchange protocols, in the common reference string model. Our protocol is actually an abstraction of the key exchange protocol of Katz et al. and is based on the...