ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Information and System Security (TISSEC), Volume 10 Issue 4, January 2008

Epidemic thresholds in real networks
Deepayan Chakrabarti, Yang Wang, Chenxi Wang, Jurij Leskovec, Christos Faloutsos
Article No.: 1
DOI: 10.1145/1284680.1284681

How will a virus propagate in a real network? How long does it take to disinfect a network given particular values of infection rate and virus death rate? What is the single best node to immunize? Answering these questions is...

Formal foundations for hybrid hierarchies in GTRBAC
James B. D. Joshi, Elisa Bertino, Arif Ghafoor, Yue Zhang
Article No.: 2
DOI: 10.1145/1284680.1284682

A role hierarchy defines permission acquisition and role-activation semantics through role--role relationships. It can be utilized for efficiently and effectively structuring functional roles of an organization having related access-control needs....

Controlled physical random functions and applications
Blaise Gassend, Marten Van Dijk, Dwaine Clarke, Emina Torlak, Srinivas Devadas, Pim Tuyls
Article No.: 3
DOI: 10.1145/1284680.1284683

The cryptographic protocols that we use in everyday life rely on the secure storage of keys in consumer devices. Protecting these keys from invasive attackers, who open a device to steal its key, is a challenging problem. We propose controlled...

Dynamic access-control policies on XML encrypted data
Luc Bouganim, Francois Dang Ngoc, Philippe Pucheral
Article No.: 4
DOI: 10.1145/1284680.1284684

The erosion of trust put in traditional database servers and in Database Service Providers and the growing interest for different forms of selective data dissemination are different factors that lead to move the access-control from servers to...

On predictive models and user-drawn graphical passwords
P. C. van Oorschot, Julie Thorpe
Article No.: 5
DOI: 10.1145/1284680.1284685

In commonplace text-based password schemes, users typically choose passwords that are easy to recall, exhibit patterns, and are thus vulnerable to brute-force dictionary attacks. This leads us to ask whether other types of passwords (e.g.,...

ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
Baruch Awerbuch, Reza Curtmola, David Holmer, Cristina Nita-Rotaru, Herbert Rubens
Article No.: 6
DOI: 10.1145/1284680.1341892

Ah hoc networks offer increased coverage by using multihop communication. This architecture makes services more vulnerable to internal attacks coming from compromised nodes that behave arbitrarily to disrupt the network, also referred to as...