Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 6 Issue 1, February 2003

Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
Ting Yu, Marianne Winslett, Kent E. Seamons
Pages: 1-42
DOI: 10.1145/605434.605435
Business and military partners, companies and their customers, and other closely cooperating parties may have a compelling need to conduct sensitive interactions on line, such as accessing each other's local services and other local resources....

On the relationship between strand spaces and multi-agent systems
Joseph Y. Halpern, Riccardo Pucella
Pages: 43-70
DOI: 10.1145/605434.605436
Strand spaces are a popular framework for the analysis of security protocols. Strand spaces have some similarities to a formalism used successfully to model protocols for distributed systems, namely multi-agent systems. We explore the...

A logical framework for reasoning about access control models
Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca
Pages: 71-127
DOI: 10.1145/605434.605437
The increased awareness of the importance of data protection has made access control a relevant component of current data management systems. Moreover, emerging applications and data models call for flexible and expressive access control models. This...

Delegation logic: A logic-based approach to distributed authorization
Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum
Pages: 128-171
DOI: 10.1145/605434.605438
We address the problem of authorization in large-scale, open, distributed systems. Authorization decisions are needed in electronic commerce, mobile-code execution, remote resource sharing, privacy protection, and many other applications. We adopt...