Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 11 Issue 1, February 2008

Indrakshi Ray
Article No.: 1
DOI: 10.1145/1330295.1330296

The Traust Authorization Service
Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch
Article No.: 2
DOI: 10.1145/1330295.1330297

In recent years, trust negotiation has been proposed as a novel authorization solution for use in open-system environments, in which resources are shared across organizational boundaries. Researchers have shown that trust negotiation is indeed a...

Toward a Usage-Based Security Framework for Collaborative Computing Systems
Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi Sandhu
Article No.: 3
DOI: 10.1145/1330295.1330298

Collaborative systems such as Grids provide efficient and scalable access to distributed computing capabilities and enable seamless resource sharing between users and platforms. This heterogeneous distribution of resources and the various modes of...

XACML Policy Integration Algorithms
Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino
Article No.: 4
DOI: 10.1145/1330295.1330299

XACML is the OASIS standard language specifically aimed at the specification of authorization policies. While XACML fits well with the security requirements of a single enterprise (even if large and composed by multiple departments), it does not...