Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 2 Issue 3, Aug. 1999

Public-key cryptography and password protocols
Shai Halevi, Hugo Krawczyk
Pages: 230-268
DOI: 10.1145/322510.322514
We study protocols for strong authentication and key exchange in asymmetric scenarios where the authentication server possesses ~a pair of private and public keys while the client has only a weak human-memorizable password as its authentication...

Design of a high-performance ATM firewall
Jun Xu, Mukesh Singhal
Pages: 269-294
DOI: 10.1145/322510.322520
A router-based packet-filtering firewall is an effective way of protecting an enterprise network from unauthorized access. However, it will not work efficiently in an ATM network because it requires the termination of end-to-end ATM connections...

Temporal sequence learning and data reduction for anomaly detection
Terran Lane, Carla E. Brodley
Pages: 295-331
DOI: 10.1145/322510.322526
The anomaly-detection problem can be formulated as one of learning to characterize the behaviors of an individual, system, or network in terms of temporal sequences of discrete data. We present an approach on the basis of instance-based...

Inductive analysis of the Internet protocol TLS
Lawrence C. Paulson
Pages: 332-351
DOI: 10.1145/322510.322530
Internet browsers use security protocols to protect sensitive messages. An inductive analysis of TLS (a descendant of SSL 3.0) has been performed using the theorem prover Isabelle. Proofs are based on higher-order logic and make no assumptions...