ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Information and System Security (TISSEC), Volume 3 Issue 2, May 2000

Xor-trees for efficient anonymous multicast and reception
Shlomi Dolev, Rafail Ostrobsky
Pages: 63-84
DOI: 10.1145/354876.354877
We examine the problem of efficient anonymous multicast and reception in general communication networks. We present algorithms that achieve anonymous communication, are protected against traffic analysis, and require O(1)...

Configuring role-based access control to enforce mandatory and discretionary access control policies
Sylvia Osborn, Ravi Sandhu, Qamar Munawer
Pages: 85-106
DOI: 10.1145/354876.354878
Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary access control. Subsequently, role-based access control has been introduced, along with claims that its mechanisms are...

Key management for encrypted broadcast
Avishai Wool
Pages: 107-134
DOI: 10.1145/354876.354879
We consider broadcast applications where the transmissions need to be encrypted, such as direct broadcast digital TV networks or Internet multicast. In these applications the number of encrypted TV programs may be very large, but the secure...