Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 4 Issue 2, May 2001

Secure virtual enclaves: Supporting coalition use of distributed application technologies

Pages: 103-133
DOI: 10.1145/501963.501964
The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application objects, while respecting organizational autonomy over local resources. The infrastructure is transparent to...

Secure password-based cipher suite for TLS

Pages: 134-157
DOI: 10.1145/501963.501965
SSL is the de facto standard today for securing end-to-end transport on the Internet. While the protocol itself seems rather secure, there are a number of risks that lurk in its use, for example, in web banking. However, the adoption of...

Practical safety in flexible access control models
Trent Jaeger, Jonathon E. Tidswell
Pages: 158-190
DOI: 10.1145/501963.501966
Assurance that an access control configuration will not result in the leakage of a right to an unauthorized principal, called safety, is fundamental to ensuring that the most basic of access control policies can be enforced. It has been proven...