Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 13, Issue 4December 2010
Reflects downloads up to 03 Jan 2025Bibliometrics
Skip Table Of Content Section
research-article
Pairing-Based Onion Routing with Improved Forward Secrecy
Article No.: 29, Pages 1–32https://doi.org/10.1145/1880022.1880023

This article presents new protocols for onion routing anonymity networks. We define a provably secure privacy-preserving key agreement scheme in an identity-based infrastructure setting, and use it to design new onion routing circuit constructions. ...

research-article
Storage-Based Intrusion Detection
Article No.: 30, Pages 1–27https://doi.org/10.1145/1880022.1880024

Storage-based intrusion detection consists of storage systems watching for and identifying data access patterns characteristic of system intrusions. Storage systems can spot several common intruder actions, such as adding backdoors, inserting Trojan ...

research-article
Attribute-Based Messaging: Access Control and Confidentiality
Article No.: 31, Pages 1–35https://doi.org/10.1145/1880022.1880025

Attribute-Based Messaging (ABM) enables messages to be addressed using attributes of recipients rather than an explicit list of recipients. Such messaging offers benefits of efficiency, exclusiveness, and intensionality, but faces challenges in access ...

research-article
Authenticated Index Structures for Aggregation Queries
Article No.: 32, Pages 1–35https://doi.org/10.1145/1880022.1880026

Query authentication is an essential component in Outsourced DataBase (ODB) systems. This article introduces efficient index structures for authenticating aggregation queries over large datasets. First, we design an index that features good performance ...

research-article
A Simple and Generic Construction of Authenticated Encryption with Associated Data
Article No.: 33, Pages 1–16https://doi.org/10.1145/1880022.1880027

We revisit the problem of constructing a protocol for performing Authenticated Encryption with Associated Data (AEAD). A technique is described which combines a collision-resistant hash function with a protocol for Authenticated Encryption (AE). The ...

research-article
MPSS: Mobile Proactive Secret Sharing
Article No.: 34, Pages 1–32https://doi.org/10.1145/1880022.1880028

This article describes MPSS, a new way to do proactive secret sharing. MPSS provides mobility: The group of nodes holding the shares of the secret can change at each resharing, which is essential in a long-lived system. MPSS additionally allows the ...

research-article
Uncovering Spoken Phrases in Encrypted Voice over IP Conversations
Article No.: 35, Pages 1–30https://doi.org/10.1145/1880022.1880029

Although Voice over IP (VoIP) is rapidly being adopted, its security implications are not yet fully understood. Since VoIP calls may traverse untrusted networks, packets should be encrypted to ensure confidentiality. However, we show that it is possible ...

research-article
Mining Roles with Multiple Objectives
Article No.: 36, Pages 1–35https://doi.org/10.1145/1880022.1880030

With the growing adoption of Role-Based Access Control (RBAC) in commercial security and identity management products, how to facilitate the process of migrating a non-RBAC system to an RBAC system has become a problem with significant business impact. ...

research-article
Key Evolution Systems in Untrusted Update Environments
Article No.: 37, Pages 1–34https://doi.org/10.1145/1880022.1880031

Forward-Secure Signatures (FSS) prevent forgeries for past time periods when an attacker obtains full access to the signer’s storage by evolving the private key in a one-way fashion. To simplify the integration of these primitives into standard security ...

research-article
Robust Decentralized Virtual Coordinate Systems in Adversarial Environments
Article No.: 38, Pages 1–34https://doi.org/10.1145/1880022.1880032

Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine the latency to arbitrary hosts without actively monitoring all of the nodes in the network. Many of the proposed systems were designed ...

research-article
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
Article No.: 39, Pages 1–33https://doi.org/10.1145/1880022.1880033

Several credential systems have been proposed in which users can authenticate to service providers anonymously. Since anonymity can give users the license to misbehave, some variants allow the selective deanonymization (or linking) of misbehaving users ...

research-article
Satisfiability and Resiliency in Workflow Authorization Systems
Article No.: 40, Pages 1–35https://doi.org/10.1145/1880022.1880034

We propose the role-and-relation-based access control (R2BAC) model for workflow authorization systems. In R2BAC, in addition to a user’s role memberships, the user’s relationships with other users help determine whether the user is allowed to perform a ...

research-article
Identity Escrow Protocol and Anonymity Analysis in the Applied Pi-Calculus
Article No.: 41, Pages 1–29https://doi.org/10.1145/1880022.1880035

Anonymity with identity escrow attempts to allow users of an online service to remain anonymous, while providing the possibility that the service owner can break the anonymity in exceptional circumstances, such as to assist in a criminal investigation. ...

Subjects

Comments