ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Information and System Security (TISSEC), Volume 15 Issue 3, November 2012

Effectiveness and detection of denial-of-service attacks in tor
Norman Danner, Sam Defabbia-Kane, Danny Krizanc, Marc Liberatore
Article No.: 11
DOI: 10.1145/2382448.2382449

Tor is one of the more popular systems for anonymizing near-real-time communications on the Internet. Borisov et al. [2007] proposed a denial-of-service-based attack on Tor (and related systems) that significantly increases the probability of...

Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity
Michael Brennan, Sadia Afroz, Rachel Greenstadt
Article No.: 12
DOI: 10.1145/2382448.2382450

The use of stylometry, authorship recognition through purely linguistic means, has contributed to literary, historical, and criminal investigation breakthroughs. Existing stylometry research assumes that authors have not attempted to disguise...

Dynamic enforcement of abstract separation of duty constraints
David Basin, Samuel J. Burri, Günter Karjoth
Article No.: 13
DOI: 10.1145/2382448.2382451

Separation of Duties (SoD) aims at preventing fraud and errors by distributing tasks and associated authorizations among multiple users. Li and Wang [2008] proposed an algebra (SoDA) for specifying SoD requirements, which is both expressive in the...

Probabilistic analysis of onion routing in a black-box model
Joan Feigenbaum, Aaron Johnson, Paul Syverson
Article No.: 14
DOI: 10.1145/2382448.2382452

We perform a probabilistic analysis of onion routing. The analysis is presented in a black-box model of anonymous communication in the Universally Composable (UC) framework that abstracts the essential properties of onion routing in the presence...