Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 8 Issue 4, November 2005

Guest editorial: Special issue on access control models and technologies
Elena Ferrari
Pages: 349-350
DOI: 10.1145/1108906.1108907

Formal model and policy specification of usage control
Xinwen Zhang, Francesco Parisi-Presicce, Ravi Sandhu, Jaehong Park
Pages: 351-387
DOI: 10.1145/1108906.1108908
The recent usage control model (UCON) is a foundation for next-generation access control models with distinguishing properties of decision continuity and attribute mutability. A usage control decision is determined by combining authorizations,...

X-gtrbac admin: A decentralized administration model for enterprise-wide access control
Rafae Bhatti, Basit Shafiq, Elisa Bertino, Arif Ghafoor, James B. D. Joshi
Pages: 388-423
DOI: 10.1145/1108906.1108909
The modern enterprise spans several functional units or administrative domains with diverse authorization requirements. Access control policies in an enterprise environment typically express these requirements as authorization constraints. While...

Access control to people location information
Urs Hengartner, Peter Steenkiste
Pages: 424-456
DOI: 10.1145/1108906.1108910
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person's current location is a sensitive piece of information that only authorized entities should be able to learn. Several challenges arise...