Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 8 Issue 2, May 2005

Trusted paths for browsers
Zishuang (Eileen) Ye, Sean Smith, Denise Anthony
Pages: 153-186
DOI: 10.1145/1065545.1065546
Computer security protocols usually terminate in a computer; however, the human-based services which they support usually terminate in a human. The gap between the human and the computer creates potential for security problems. We examine this gap,...

X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control
Rafae Bhatti, Arif Ghafoor, Elisa Bertino, James B. D. Joshi
Pages: 187-227
DOI: 10.1145/1065545.1065547
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing services for efficient resource utilization, scalability, and flexibility. These environments are characterized by heterogeneous, distributed computing systems...

A pairwise key predistribution scheme for wireless sensor networks
Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili
Pages: 228-258
DOI: 10.1145/1065545.1065548
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent between sensor nodes. Before doing so, keys for performing encryption and authentication must be agreed upon by the communicating...