enter search term and/or author name
Privacy-Preserving Publishing of Hierarchical Data
Ismet Ozalp, Mehmet Emre Gursoy, Mehmet Ercan Nergiz, Yucel Saygin
Article No.: 7
Many applications today rely on storage and management of semi-structured information, for example, XML databases and document-oriented databases. These data often have to be shared with untrusted third parties, which makes individuals’...
On the Workflow Satisfiability Problem with Class-Independent Constraints for Hierarchical Organizations
Jason Crampton, Andrei Gagarin, Gregory Gutin, Mark Jones, Magnus Wahlström
Article No.: 8
A workflow specification defines a set of steps, a set of users, and an access control policy. The policy determines which steps a user is authorized to perform and imposes constraints on which sets of users can perform which sets of steps. The...
Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords
Christopher N. Gutierrez, Mohammed H. Almeshekah, Eugene H. Spafford, Mikhail J. Atallah, Jeff Avery
Article No.: 9
In this work, we present a simple, yet effective and practical scheme to improve the security of stored password hashes, increasing the difficulty to crack passwords and exposing cracking attempts. We utilize a hardware-dependent function (HDF),...