Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 14 Issue 3, November 2011

Guest Editorial SACMAT 2009 and 2010
James Joshi, Barbara Carminati
Article No.: 22
DOI: 10.1145/2043621.2043622

Group-Centric Secure Information-Sharing Models for Isolated Groups
Ram Krishnan, Jianwei Niu, Ravi Sandhu, William H. Winsborough
Article No.: 23
DOI: 10.1145/2043621.2043623

Group-Centric Secure Information Sharing (g-SIS) envisions bringing users and objects together in a group to facilitate agile sharing of information brought in from external sources as well as creation of new information within the group. We...

Combining Discretionary Policy with Mandatory Information Flow in Operating Systems
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
Article No.: 24
DOI: 10.1145/2043621.2043624

Discretionary Access Control (DAC) is the primary access control mechanism in today’s major operating systems. It is, however, vulnerable to Trojan Horse attacks and attacks exploiting buggy software. We propose to combine the discretionary...

Access Control Policy Translation, Verification, and Minimization within Heterogeneous Data Federations
Gregory Leighton, Denilson Barbosa
Article No.: 25
DOI: 10.1145/2043621.2043625

Data federations provide seamless access to multiple heterogeneous and autonomous data sources pertaining to a large organization. As each source database defines its own access control policies for a set of local identities, enforcing such...

Private and Continual Release of Statistics
T.-H. Hubert Chan, Elaine Shi, Dawn Song
Article No.: 26
DOI: 10.1145/2043621.2043626

We ask the question: how can Web sites and data aggregators continually release updated statistics, and meanwhile preserve each individual user’s privacy? Suppose we are given a stream of 0’s and 1’s. We propose a differentially...

The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems
Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim
Article No.: 27
DOI: 10.1145/2043621.2043627

A network coordinate system assigns Euclidean “virtual” coordinates to every node in a network to allow easy estimation of network latency between pairs of nodes that have never contacted each other. These systems have been implemented...