Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 1 Issue 1, Nov. 1998

Ravi Sandhu
Pages: 1-2
DOI: 10.1145/290163.290166

High dictionary compression for proactive password checking
Francesco Bergadano, Bruno Crispo, Giancarlo Ruffo
Pages: 3-25
DOI: 10.1145/290163.290164
The important problem of user password selection is addressed and a new proactive password-checking technique is presented. In a training phase, a decision tree is generated based on a given dictionary of weak passwords. Then, the decision tree...

Exception-based information flow control in object-oriented systems
Elisa Bertino, Sabrina De Capitani Di Vimercati, Elena Ferrari, Pierangela Samarati
Pages: 26-65
DOI: 10.1145/290163.290167
We present an approach to control information flow in object-oriented systems. The decision of whether an information flow is permitted or denied depends on both the authorizations specified on the objects and the process by which information is...

Crowds: anonymity for Web transactions
Michael K. Reiter, Aviel D. Rubin
Pages: 66-92
DOI: 10.1145/290163.290168
In this paper we introduce a system called Crowds for protecting users' anonymity on the world-wide-web. Crowds, named for the notion of “blending into a crowd,” operates by grouping users into a large and geographically diverse...

The multilevel relational (MLR) data model
Ravi Sandhu, Fang Chen
Pages: 93-132
DOI: 10.1145/290163.290171
Many multilevel relational models have been proposed; different models offer different advantages. In this paper, we adapt and refine several of the best ideas from previous models and add new ones to build the new Multilevel Relational (MLR)...