enter search term and/or author name
Alcatraz: An Isolated Environment for Experimenting with Untrusted Software
Zhenkai Liang, Weiqing Sun, V. N. Venkatakrishnan, R. Sekar
Article No.: 14
In this article, we present an approach for realizing a safe execution environment (SEE) that enables users to “try out” new software (or configuration changes to existing software) without the fear of damaging the system in any...
Compact and Anonymous Role-Based Authorization Chain
Danfeng Yao, Roberto Tamassia
Article No.: 15
We introduce a decentralized delegation model called anonymous role-based cascaded delegation. In this model, a delegator can issue authorizations on behalf of her role without revealing her identity. This type of delegation protects the sensitive...
A system for private stream searching, introduced by Ostrovsky and Skeith, allows a client to provide an untrusted server with an encrypted search query. The server uses the query on a stream of documents and returns the matching documents to the...
Many algorithms can take a variable amount of time to complete depending on the data being processed. These timing differences can sometimes disclose confidential information. Indeed, researchers have been able to reconstruct an RSA private key...
Dynamic and Efficient Key Management for Access Hierarchies
Mikhail J. Atallah, Marina Blanton, Nelly Fazio, Keith B. Frikken
Article No.: 18
Hierarchies arise in the context of access control whenever the user population can be modeled as a set of partially ordered classes (represented as a directed graph). A user with access privileges for a class obtains access to objects stored at...
A common mechanism for ensuring that software behaves securely is to monitor programs at run time and check that they dynamically adhere to constraints specified by a security policy. Whenever a program monitor detects that untrusted software is...