ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Information and System Security (TISSEC), Volume 12 Issue 1, October 2008

Status-Based Access Control
Steve Barker, Marek J. Sergot, Duminda Wijesekera
Article No.: 1
DOI: 10.1145/1410234.1410235

Despite their widespread adoption, Role-based Access Control (RBAC) models exhibit certain shortcomings that make them less than ideal for deployment in, for example, distributed access control. In the distributed case, standard RBAC assumptions...

Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions
Shouhuai Xu, Srdjan Čapkun
Article No.: 2
DOI: 10.1145/1410234.1410236

Secure bootstrapping of mobile ad hoc networks (MANETs) is a challenging problem in scenarios in which network users (or nodes) do not share trust relationships prior to the network deployment. In recent years, a number of schemes have been...

New Multiparty Signature Schemes for Network Routing Applications
Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum
Article No.: 3
DOI: 10.1145/1410234.1410237

We construct two new multiparty digital signature schemes that allow multiple signers to sequentially and non-interactively produce a compact, fixed-length signature. First, we introduce a new primitive that we call ordered multisignature...

A Graph Based Approach Toward Network Forensics Analysis
Wei Wang, Thomas E. Daniels
Article No.: 4
DOI: 10.1145/1410234.1410238

In this article we develop a novel graph-based approach toward network forensics analysis. Central to our approach is the evidence graph model that facilitates evidence presentation and automated reasoning. Based on the evidence graph, we propose...

Secrecy in Multiagent Systems
Joseph Y. Halpern, Kevin R. O'Neill
Article No.: 5
DOI: 10.1145/1410234.1410239

We introduce a general framework for reasoning about secrecy requirements in multiagent systems. Our definitions extend earlier definitions of secrecy and nondeducibility given by Shannon and Sutherland. Roughly speaking, one agent maintains...

Private Information: To Reveal or not to Reveal
Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia
Article No.: 6
DOI: 10.1145/1410234.1410240

This article studies the notion of quantitative policies for trust management and gives protocols for realizing them in a disclosure-minimizing fashion. Specifically, Bob values each credential with a certain number of points, and requires a...