Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 12 Issue 4, April 2009

Resiliency Policies in Access Control
Ninghui Li, Qihua Wang, Mahesh Tripunitara
Article No.: 20
DOI: 10.1145/1513601.1513602

We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An example resiliency policy requires that upon removal of any...

Universally Composable RFID Identification and Authentication Protocols
Mike Burmester, Tri Van Le, Breno De Medeiros, Gene Tsudik
Article No.: 21
DOI: 10.1145/1513601.1513603

As the number of RFID applications grows, concerns about their security and privacy become greatly amplified. At the same time, the acutely restricted and cost-sensitive nature of RFID tags rules out simple reuse of traditional security/privacy...

IP Covert Channel Detection
Serdar Cabuk, Carla E. Brodley, Clay Shields
Article No.: 22
DOI: 10.1145/1513601.1513604

A covert channel can occur when an attacker finds and exploits a shared resource that is not designed to be a communication mechanism. A network covert channel operates by altering the timing of otherwise legitimate network traffic so that the...