ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Information and System Security (TISSEC), Volume 9 Issue 4, November 2006

Security analysis in role-based access control
Ninghui Li, Mahesh V. Tripunitara
Pages: 391-420
DOI: 10.1145/1187441.1187442
The administration of large role-based access control (RBAC) systems is a challenging problem. In order to administer such systems, decentralization of administration tasks by the use of delegation is an effective approach. While the use of...

Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems
Giovanni Mella, Elena Ferrari, Elisa Bertino, Yunhua Koglin
Pages: 421-460
DOI: 10.1145/1187441.1187443
This paper proposes an infrastructure and related algorithms for the controlled and cooperative updates of XML documents. Key components of the proposed system are a set of XML-based languages for specifying access-control policies and the path that...

Improved efficiency for revocation schemes via Newton interpolation
Noam Kogan, Tamir Tassa
Pages: 461-486
DOI: 10.1145/1187441.1187444
We present a novel way to implement the secret-sharing-based family of revocation schemes of Naor and Pinkas [2003]. The basic scheme of [Naor and Pinkas 2000] uses Shamir's polynomial secret-sharing to revoke up to r users, where r is...