Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 17, Issue 1August 2014
Reflects downloads up to 17 Oct 2024Bibliometrics
Skip Table Of Content Section
research-article
Comparing Vulnerability Severity and Exploits Using Case-Control Studies
Article No.: 1, Pages 1–20https://doi.org/10.1145/2630069

(U.S.) Rule-based policies for mitigating software risk suggest using the CVSS score to measure the risk of an individual vulnerability and act accordingly. A key issue is whether the ‘danger’ score does actually match the risk of exploitation in the ...

research-article
Rumpole: An Introspective Break-Glass Access Control Language
Article No.: 2, Pages 1–32https://doi.org/10.1145/2629502

Access control policies define what resources can be accessed by which subjects and under which conditions. It is, however, often not possible to anticipate all subjects that should be permitted access and the conditions under which they should be ...

research-article
A Framework for Expressing and Enforcing Purpose-Based Privacy Policies
Article No.: 3, Pages 1–31https://doi.org/10.1145/2629689

Purpose is a key concept in privacy policies. Although some models have been proposed for enforcing purpose-based privacy policies, little has been done in defining formal semantics for purpose, and therefore an effective enforcement mechanism for such ...

research-article
Security Analysis of Accountable Anonymity in Dissent
Article No.: 4, Pages 1–35https://doi.org/10.1145/2629621

Users often wish to communicate anonymously on the Internet, for example, in group discussion or instant messaging forums. Existing solutions are vulnerable to misbehaving users, however, who may abuse their anonymity to disrupt communication. Dining ...

Subjects

Comments