Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 18 Issue 3, April 2016

Behavioral Study of Users When Interacting with Active Honeytokens
Asaf Shabtai, Maya Bercovitch, Lior Rokach, Ya'akov (Kobi) Gal, Yuval Elovici, Erez Shmueli
Article No.: 9
DOI: 10.1145/2854152

Active honeytokens are fake digital data objects planted among real data objects and used in an attempt to detect data misuse by insiders. In this article, we are interested in understanding how users (e.g., employees) behave when interacting with...

A New Framework for Privacy-Preserving Aggregation of Time-Series Data
Fabrice Benhamouda, Marc Joye, BenoîT Libert
Article No.: 10
DOI: 10.1145/2873069

Aggregator-oblivious encryption is a useful notion put forward by Shi et al. in 2011 that allows an untrusted aggregator to periodically compute an aggregate value over encrypted data contributed by a set of users. Such encryption schemes find...

An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics
Nan Zheng, Aaron Paloski, Haining Wang
Article No.: 11
DOI: 10.1145/2893185

Biometric authentication verifies a user based on its inherent, unique characteristics—who you are. In addition to physiological biometrics, behavioral biometrics has proven very useful in authenticating a user. Mouse dynamics, with their...