ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Information and System Security (TISSEC), Volume 12 Issue 3, January 2009

Alcatraz: An Isolated Environment for Experimenting with Untrusted Software
Zhenkai Liang, Weiqing Sun, V. N. Venkatakrishnan, R. Sekar
Article No.: 14
DOI: 10.1145/1455526.1455527

In this article, we present an approach for realizing a safe execution environment (SEE) that enables users to “try out” new software (or configuration changes to existing software) without the fear of damaging the system in any...

Compact and Anonymous Role-Based Authorization Chain
Danfeng Yao, Roberto Tamassia
Article No.: 15
DOI: 10.1145/1455526.1455528

We introduce a decentralized delegation model called anonymous role-based cascaded delegation. In this model, a delegator can issue authorizations on behalf of her role without revealing her identity. This type of delegation protects the sensitive...

New Techniques for Private Stream Searching
John Bethencourt, Dawn Song, Brent Waters
Article No.: 16
DOI: 10.1145/1455526.1455529

A system for private stream searching, introduced by Ostrovsky and Skeith, allows a client to provide an untrusted server with an encrypted search query. The server uses the query on a stream of documents and returns the matching documents to the...

Opportunities and Limits of Remote Timing Attacks
Scott A. Crosby, Dan S. Wallach, Rudolf H. Riedi
Article No.: 17
DOI: 10.1145/1455526.1455530

Many algorithms can take a variable amount of time to complete depending on the data being processed. These timing differences can sometimes disclose confidential information. Indeed, researchers have been able to reconstruct an RSA private key...

Dynamic and Efficient Key Management for Access Hierarchies
Mikhail J. Atallah, Marina Blanton, Nelly Fazio, Keith B. Frikken
Article No.: 18
DOI: 10.1145/1455526.1455531

Hierarchies arise in the context of access control whenever the user population can be modeled as a set of partially ordered classes (represented as a directed graph). A user with access privileges for a class obtains access to objects stored at...

Run-Time Enforcement of Nonsafety Policies
Jay Ligatti, Lujo Bauer, David Walker
Article No.: 19
DOI: 10.1145/1455526.1455532

A common mechanism for ensuring that software behaves securely is to monitor programs at run time and check that they dynamically adhere to constraints specified by a security policy. Whenever a program monitor detects that untrusted software is...