Journal of Information Assurance and Security

Volume 2, Issue 2, June  2007

 

  Page no.
   
   
A Security Surveillance System with a Realized Structural Low-Level Network Monitor 87
Tomi Raty, Esa Tikkala, Jouko Sankala and Petri Jurmu  
   
Developing Intrusion Detection and Prevention System for IP Multimedia Subsystem Application Servers 97
M. Sher, T. Magedanz  
 
  Increasing Confidence of IDS through Anomaly Propagation Analysis 107

A. Tokhtabayev and V. Skormin

 
 
 Integrating Multi-Modal Circuit Features within an Efficient Encryption System 117
E. Papoutsis, G. Howells, A. Hopkins and K. McDonald-Maier  
   
1Session-Based Misbehaviour Detection Framework for Wireless Ad hoc Network 127

T. Fahad, R. Askwith, D. Djenouri, M. Merabti

 
 
1 Group Based Secure Communication for Large-Scale Wireless Sensor Networks 139
K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones  
 
  Guest Editorial 153

Konrad Wrona and Krzysztof Szczypiorski  

 
   
1 Access Control for Cross-Organisational Web Service Composition 155
  Michael Menzel , Christian Wolter and Christoph Meinel  

Copyright ?2005 - 2009, Dynamic Publishers Inc., USA



No part of Journal of Information Assurance and Security may be reproduced or transmitted in any form or by any means without written permission from the publisher. Journal of Information Assurance and Security has been registered with the Copyright Clearance Center (CCC) Transactional Reporting Services. Consent is given for coping of articles for personal or internal use, or for the personal use of specific clients provided that the base fee $05.00 (per copy, per article) is paid directly to CCC, 27 Congress St., Salem, MA 01970, USA. For those organizations that have been granted a photo copy license by CCC, a separate system of payment has been arranged. The fee code for users of the Transactional Reporting Service is 1060 5369/93 $03.50.