ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Privacy and Security (TOPS), Volume 19 Issue 3, December 2016

Privacy-Preserving Publishing of Hierarchical Data
Ismet Ozalp, Mehmet Emre Gursoy, Mehmet Ercan Nergiz, Yucel Saygin
Article No.: 7
DOI: 10.1145/2976738

Many applications today rely on storage and management of semi-structured information, for example, XML databases and document-oriented databases. These data often have to be shared with untrusted third parties, which makes individuals’...

On the Workflow Satisfiability Problem with Class-Independent Constraints for Hierarchical Organizations
Jason Crampton, Andrei Gagarin, Gregory Gutin, Mark Jones, Magnus Wahlström
Article No.: 8
DOI: 10.1145/2988239

A workflow specification defines a set of steps, a set of users, and an access control policy. The policy determines which steps a user is authorized to perform and imposes constraints on which sets of users can perform which sets of steps. The...

Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords
Christopher N. Gutierrez, Mohammed H. Almeshekah, Eugene H. Spafford, Mikhail J. Atallah, Jeff Avery
Article No.: 9
DOI: 10.1145/2996457

In this work, we present a simple, yet effective and practical scheme to improve the security of stored password hashes, increasing the difficulty to crack passwords and exposing cracking attempts. We utilize a hardware-dependent function (HDF),...