


default search action
Computers & Security, Volume 28
Volume 28, Numbers 1-2, February - March 2009
- Stephen D. Wolthusen:

Editorial. 1 - Sergei A. Obiedkov

, Derrick G. Kourie, Jan H. P. Eloff:
Building access control models with attribute exploration. 2-7 - Travis D. Breaux

, Annie I. Antón, Eugene H. Spafford
:
A distributed requirements management framework for legal compliance and accountability. 8-17 - Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo, Gabriel Maciá-Fernández

, Enrique Vázquez
:
Anomaly-based network intrusion detection: Techniques, systems and challenges. 18-28 - Xiaozhuo Gu, Jianzu Yang, Julong Lan, Zhenhuan Cao:

Huffman-based join-exit-tree scheme for contributory key management. 29-39 - Javad Akbari Torkestani, Mohammad Reza Meybodi:

RAID-RMS: A fault tolerant stripped mirroring RAID architecture for distributed systems. 40-46 - Catherine S. Weir, Gary Douglas, Martin Carruthers, Mervyn A. Jack:

User perceptions of security, convenience and usability for ebanking authentication tokens. 47-62 - Amir Herzberg

:
Why Johnny can't surf (safely)? Attacks and defenses for web users. 63-71 - Hongxin Zhang, Yuewang Huang, Jianxin Wang, Yinghua Lu, Jinling Zhang:

Recognition of electro-magnetic leakage information from computer radiation with SVM. 72-76 - K. Vimal Kumar

:
Securing communication using function extraction technology for malicious code behavior analysis. 77-84 - Seongseob Hwang, Sungzoon Cho, Sunghoon Park:

Keystroke dynamics-based authentication for mobile devices. 85-93 - Jasim A. Ghaeb

, Jalel Chebil
:
An oblique-matrix technique for data integrity assurance. 94-99
- Song Lin, Biao Wang, Zhoujun Li:

Digital multisignature on the generalized conic curve over Zn. 100-104
Volume 28, Numbers 3-4, May - June 2009
- Albert Levi

, Can Berk Güder:
Understanding the limitations of S/MIME digital signatures for e-mails: A GUI based approach. 105-120 - Dimitris Mitropoulos, Diomidis Spinellis

:
SDriver: Location-specific signatures prevent SQL injection attacks. 121-129 - Reinhardt A. Botha

, Steven Furnell
, Nathan L. Clarke
:
From desktop to mobile: Examining the security experience. 130-137 - Jen-Ho Yang, Chin-Chen Chang:

An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. 138-143 - Kuo-Fong Kao, I-En Liao, Yueh-Chia Li:

Detecting rogue access points using client-side bottleneck bandwidth analysis. 144-152 - Reza Sadoddin, Ali A. Ghorbani:

An incremental frequent structure mining framework for real-time alert correlation. 153-173 - Alessandro Basso, Stefano Sicco:

Preventing massive automated access to web resources. 174-188 - M. T. Dlamini

, Jan H. P. Eloff, Mariki M. Eloff
:
Information security: The moving target. 189-198 - Mawloud Omar, Yacine Challal

, Abdelmadjid Bouabdallah:
Reliable and fully distributed trust model for mobile ad hoc networks. 199-214 - Divakaran Liginlal

, Inkook Sim, Lara Khansa
:
How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management. 215-228 - P. P. Deepthi, P. S. Sathidevi:

Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions. 229-241
Volume 28, Number 5, July 2009
- Dimitris Gritzalis, Sokratis K. Katsikas

:
Editorial. 247 - John Gerdes Jr., Joakim Kalvenes, Chin-Tser Huang:

Multi-dimensional credentialing using veiled certificates: Protecting privacy in the face of regulatory reporting requirements. 248-259 - Qi Li, Xinwen Zhang, Mingwei Xu, Jianping Wu:

Towards secure dynamic collaborations with group-based RBAC model. 260-275 - Hyunsang Choi, Heejo Lee, Hyogon Kim:

Fast detection and visualization of network attacks on parallel coordinates. 276-288 - Mildrey Carbonell, José María Sierra

, Javier López
:
Secure multiparty payment with an intermediary entity. 289-300 - Ming-Yang Su, Gwo-Jong Yu, Chun-Yuen Lin:

A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach. 301-309 - Siraj A. Shaikh

, Vicky J. Bush
, Steve A. Schneider
:
Specifying authentication using signal events in CSP. 310-324
Volume 28, Number 6, September 2009
- Dimitris Gritzalis, Javier López

:
Editorial. 325-326 - Siddharth Bhatt, Radu Sion

, Bogdan Carbunar:
A personal mobile DRM manager for smartphones. 327-340 - Azzam Mourad

, Andrei Soeanu, Marc-André Laverdière, Mourad Debbabi
:
New aspect-oriented constructs for security hardening concerns. 341-358 - Djamel Fawzi Hadj Sadok, Eduardo Souto, Eduardo Feitosa

, Judith Kelner, Lars Westberg:
RIP - A robust IP access architecture. 359-380 - Michael Edward Edge, Pedro R. Falcone Sampaio:

A survey of signature based methods for financial fraud detection. 381-394 - Ibrahim Kamel

, Qutaiba Albluwi:
A robust software watermarking for copyright protection. 395-409 - Mohammad Mannan, Paul C. van Oorschot

:
Reducing threats from flawed security APIs: The banking PIN case. 410-420 - Joon Son, Jim Alves-Foss:

A formal framework for real-time information flow analysis. 421-432 - Francesco Palmieri

, Ugo Fiore
:
Providing true end-to-end security in converged voice over IP infrastructures. 433-449 - Stylianos Basagiannis

, Panagiotis Katsaros
, Andrew Pombortsis, Nikolaos Alexiou:
Probabilistic model checking for the quantification of DoS security threats. 450-465 - Yang Li, Jun-Li Wang, Zhihong Tian, Tianbo Lu

, Chen Young:
Building lightweight intrusion detection system using wrapper-based feature selection mechanisms. 466-475 - Eirik Albrechtsen, Jan Hovden:

The information security digital divide between information security managers and users. 476-490
Volume 28, Number 7, October 2009
- Dimitris Gritzalis, Steven Furnell

:
Editorial. 491-492 - Kenneth J. Knapp, R. Franklin Morris Jr., Thomas E. Marshall, Terry Anthony Byrd:

Information security policy: An organizational-level process model. 493-508 - Sara Kraemer, Pascale Carayon

, John Clem:
Human and organizational factors in computer and information security: Pathways to vulnerabilities. 509-520 - Howard Chivers, John A. Clark, Pau-Chen Cheng:

Risk profiles and distributed risk assessment. 521-535 - Keshnee Padayachee

, Jan H. P. Eloff:
Adapting usage control as a deterrent to address the inadequacies of access controls. 536-544 - Félix Gómez Mármol

, Gregorio Martínez Pérez
:
Security threats scenarios in trust and reputation models for distributed systems. 545-556 - Hongwei Lu, Bailing Liu:

DFANS: A highly efficient strategy for automated trust negotiation. 557-565 - Nicola Dragoni

, Fabio Massacci
, Thomas Walter, Christian Schaefer:
What the heck is this application doing? - A security-by-contract architecture for pervasive services. 566-577 - Dimitris Geneiatakis, Nikos Vrakas, Costas Lambrinoudakis

:
Utilizing bloom filters for detecting flooding attacks against SIP based services. 578-591 - Engin Kirda, Nenad Jovanovic, Christopher Kruegel, Giovanni Vigna:

Client-side cross-site scripting protection. 592-604 - Zonghua Zhang

, Pin-Han Ho, Liwen He:
Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach. 605-614 - Gerhard P. Hancke

, Keith Mayes, Konstantinos Markantonakis
:
Confidence in smart token proximity: Relay attacks revisited. 615-627 - Fangwei Wang

, Yunkai Zhang, Jianfeng Ma:
Defending passive worms in unstructured P2P networks based on healthy file dissemination. 628-636 - Scott E. Coull, Boleslaw K. Szymanski

:
On the development of an internetwork-centric defense for scanning worms. 637-647 - Suleyman Kondakci

:
A concise cost analysis of Internet malware. 648-659 - Gedare Bloom, Bhagirath Narahari, Rahul Simha, Joseph Zambreno:

Providing secure execution environments with a last line of defense against Trojan circuit attacks. 660-669 - Özdemir Çetin, Ahmet Turan Özcerit

:
A new steganography algorithm based on color histograms for data embedding into raw video streams. 670-682 - S. Geetha

, Siva S. Sivatha Sindhu, N. Kamaraj:
Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system. 683-697 - Ibrahim Kamel

:
A schema for protecting the integrity of databases. 698-709 - Refik Samet

:
Design and implementation of highly reliable dual-computer systems. 710-722
Volume 28, Number 8, November 2009
- Dimitris Gritzalis, Tom Karygiannis:

Editorial. 729-730 - Amir Herzberg

:
DNS-based email sender authentication mechanisms: A critical review. 731-742 - Ram Dantu, Sonia Fahmy

, Henning Schulzrinne
, João W. Cangussu:
Issues and challenges in securing VoIP. 743-753 - Srdjan Pudar, G. Manimaran, Chen-Ching Liu:

PENET: A practical method and tool for integrated modeling of security attacks and countermeasures. 754-771 - Juan Pedro Muñoz-Gea

, Josemaria Malgosa-Sanahuja
, Pilar Manzanares-Lopez
, Juan Carlos Sánchez-Aarnoutse
, Joan García-Haro
:
Proposal, design and evaluation of a mechanism to limit the length of anonymous overlay network paths. 772-784 - Lihong Yao, Xiaochao Zi, Li Pan, Jianhua Li:

A study of on/off timing channel based on packet delay distribution. 785-794 - Junsup Lee, Sung Deok Cha, Dongkun Lee, Hyungkyu Lee:

Classification of web robots: An empirical study based on over one billion requests. 795-802 - Yu-Lun Huang, P. H. Lu, J. Doug Tygar, Anthony D. Joseph

:
OSNP: Secure wireless authentication protocol using one-time key. 803-815 - Hyeun-Suk Rhee, Cheong-Tag Kim

, Young U. Ryu
:
Self-efficacy in information security: Its influence on end users' information security practice behavior. 816-826 - Yong Tang, Bin Xiao

, Xicheng Lu:
Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms. 827-842 - Jorge Fontenla González, Manuel Caeiro-Rodríguez

, Martín Llamas Nistal, Luis E. Anido-Rifón
:
Reverse OAuth: A solution to achieve delegated authorizations in single sign-on e-learning systems. 843-856

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














