Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 2 Issue 2, May 1999

Authentication metric analysis and design
Michael K. Reiter, Stuart G. Stubblebine
Pages: 138-158
DOI: 10.1145/317087.317088
Authentication using a path of trusted intermediaries, each able to authenicate the next in the path, is a well-known technique for authenicating entities in a large-scale system. Recent work has extended this technique to include multiple paths...

Secure audit logs to support computer forensics
Bruce Schneier, John Kelsey
Pages: 159-176
DOI: 10.1145/317087.317089
In many real-world applications, sensitive information must be kept it log files on an untrusted machine. In the event that an attacker captures this machine, we would like to guarantee that he will gain little or no information from the log...

Flexible control of downloaded executable content
Trent Jaeger, Atul Prakash, Jochen Liedtke, Nayeem Islam
Pages: 177-228
DOI: 10.1145/317087.317091
We present a security architecture that enables system and application a ccess control requirements to be enforced on applications composed from downloaded executable content. Downloaded executable content consists of messages downloaded from...