Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 6 Issue 3, August 2003

Policy management using access control spaces
Trent Jaeger, Xiaolan Zhang, Antony Edwards
Pages: 327-364
DOI: 10.1145/937527.937528
We present the concept of an access control space and investigate how it may be useful in managing access control policies. An access control space represents the permission assignment state of a subject or role. For example, the set of...

OCB: A block-cipher mode of operation for efficient authenticated encryption
Phillip Rogaway, Mihir Bellare, John Black
Pages: 365-403
DOI: 10.1145/937527.937529
We describe a parallelizable block-cipher mode of operation that simultaneously provides privacy and authenticity. OCB encrypts-and-authenticates a nonempty string M ∈ {0, 1}* using...

A rule-based framework for role-based delegation and revocation
Longhua Zhang, Gail-Joon Ahn, Bei-Tseng Chu
Pages: 404-441
DOI: 10.1145/937527.937530
Delegation is the process whereby an active entity in a distributed environment authorizes another entity to access resources. In today's distributed systems, a user often needs to act on another user's behalf with some subset of his/her rights. Most...