Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 5 Issue 2, May 2002

Trust management for IPsec

Pages: 95-118
DOI: 10.1145/505586.505587
IPsec is the standard suite of protocols for network-layer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how protected traffic should be handled at security end points. This...

An algebraic approach to IP traceback
Drew Dean, Matt Franklin, Adam Stubblefield
Pages: 119-137
DOI: 10.1145/505586.505588
We present a new solution to the problem of determining the path a packet traversed over the Internet (called the traceback problem) during a denial-of-service attack. This article reframes the traceback problem as a polynomial reconstruction problem...

Termination in language-based systems
Algis Rudys, Dan S. Wallach
Pages: 138-168
DOI: 10.1145/505586.505589
Language run-time systems are increasingly being embedded in systems to support run-time extensibility via mobile code. Such systems raise a number of concerns when the code running in such systems is potentially buggy or untrusted. Although...

A fine-grained access control system for XML documents
Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
Pages: 169-202
DOI: 10.1145/505586.505590
Web-based applications greatly increase information availability and ease of access, which is optimal for public information. The distribution and sharing of information via the Web that must be accessed in a selective way, such as electronic...