Journal of Information Assurance and Security

Volume 4, Issue 4(Upcoming papers)

Special Issue on Access Control and Protcols  

Guest Editors: Ning Zhang, University of Manchester, UK; Qi Shi, Liverpool John Moores University, UK

  Page no.

Using Qualia and Hierarchical Models in Malware Detection
 Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Mark E. Oxley, and Steven K. Rogers


ACMF: Framework for modeling attack based on Capability Model
  Navneet Kumar Pandey, S. K. Gupta and Shaveta Leekha



Analysis of User Command Behavior and Masquerade Detection   265

 Shou-Hsuan Stephen Huang and Han-Ching Wu


A Kernel Data Analysis Method  for Detecting Flood Attacks (brief paper)

  Jaeik Cho, Manhyun Chung and Jongsub Moon


1A security policy and Network Cartography based Intrusion Detection and Prevention Systems
  Sourour Meharouech, Adel Bouhoula, Tarek Abbes


Detection of Email Worm-Infected Machines on the Local Name Servers Using Time Series Analysis 292
Nikolaos Chatzis and Radu Popescu-Zeletin


Automated framework for policy optimization in firewalls and security gateways
   Gianluca Maiolini, Alessio Nicotra, Paolo Tornari, and Andrea Baiocchi


Abusing SIP authentication
  Humberto Abdelnur, Tigran Avanesov, Michael Rusinowitch and Radu State



Security Analysis of RBAC with Temporal Constraints A Model Checking Approach   319

  Samrat Mondal and Shamik Sural


A Novel Validation Method for Firewall Security Policy

  Ryma Abbassi and Sihem Guemara El Fatmi


1Towards a secure E-passport protocol based on biometrics
  Mohamed Abid and Hossam Afifi


Multiple Speaker Models and their Combination in Access Control Tasks 346
  Donato Impedovo and Mario Refice

A Security Framework and its Implementation in Fast Data Transfer Next Generation Protocol UDT 354
  Danilo Valeros Bernardo, Doan Hoang


A Purchase Protocol with Multichannel Authentication 361
  Hannan Xiao, Bruce Christianson, and Ying Zhang

Formal definition and comparison of access control models


  Lionel Habib, Mathieu Jaume and Charles Morisset

A Model for the Study of Privacy Issues in Secure Shell Connections
  Maurizio Dusi, Francesco Gringoli, Luca Salgarelli



Secure Connected Home: where the semantic technologies meet the device community 390

 Mohammad M. R. Chowdhury, Sarfraz Alam and Josef Noll


Identity Resolutionin Criminal Justice Data: An Application of NORA and SUDA

  Queen E. Booker


1Privacy Compliance with Web Services
  Peter Bodorik,  Dawn Jutla, and Indermohan Dhillon 


Determining the State Sequence to Maximize P(O,I│λ) on Distributed HMMs with Privacy 422
Sahin Renkes, Huseyin Polat and Yusuf Oysal


Geolocation-based Trust for Vanet’s Privacy
   Jetzabel Serna, Jesus Luna and Manel Medina


A Friend Mechanism for Mobile Ad Hoc Networks
 Shukor Abd Razak, Normalia Samian, Mohd. Aizaini Ma’arof, S. M. Furnell and N. L.    Clarke, P. J. Brooke



Trusted-Computing Technologies for the Protection of Critical Information Systems   449

 Antonio Lioy, Gianluca Ramunno and Davide Vernizzi


Evaluating the Device Reputation through Full Observation in MANETs

  G. Bella, G. Costantino and S. Riccobene


1Bidirectional Secret Communication by Quantum Collisions
 Fabio Antonio Bovino


A Watermarking Technique based on Visual Cryptography  (short paper) 470
 B. Surekha, G.N. Swamy, K. Srinivasa Rao and A. Ravi Kumar

Adapting and accelerating the Stream Cipher Algorithm "RC4" using "Ultra Gridsec" and "HIMAN" and use it to secure "HIMAN" Data 474
 Hisham A. Kholidy and  Khaled S. Alghathbar


Enhancing File Data Security in Linux Operating System by Integrating Secure File System 484
 Rajesh Kumar Pal and Indranil Sengupta

Challenges for Security Typed Web Scripting Languages Design


 Doaa Hassan, Sherif El- Kassas and Ibrahim Ziedan

Security Issues in Drinking Water Distribution Networks

 Demetrios G. Eliades, Marios M. Polycarpou and Bambos Charalambous


1Protection of Real and Artwork Human Objects based on a Chaotic Moments Modulation Method
 Klimis Ntalianis, Paraskevi Tzouveli, Stefanos Kollias and Athanasios Drigas


Security Requirements in Judicial Information Systems: Experience from a European Project for Judicial Cross-Border Collaboration 519
 George Eleftherakis, Konstantinos Rousis, Mauro Cislaghi, Roberto Mazzilli and    Sara Ferri

Secure Communication for Hierarchical Groups 530
 Sigurd Eskeland and Vladimir Oleshchuk


Time Domain Performances Analysis of Underwater Magnetic SIMAN Systems for Port Protection 538
  Osvaldo Faggioni, Maurizio Soldani, Davide Leoncini, Amleto Gabellone and Paolo   V. Maggiani

The Pushdown Attack and Attacking the Substitution Cipher Chaining mode (SCC)


 Mohamed Abo El-Fotouh and Klaus Diepold

Usability Evaluation of Identity Management Schemes in Three Virtual Organization Architectures
  Ali E. Abdallah, Ali N. Haidar



Loss of Self-Similarity Detection Using Exact and Asymptotic Self-Similarity Models 571

 Mohd Fo’ad Rohani, Mohd Aizaini Maarof, Ali Selamat and Houssain Kettani


FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks

  Devesh Jinwala, Dhiren Patel and Kankar Dasgupta


1Statistical anomaly detection on real e-mail traffic
 Maurizio Aiello, Davide Chiarella and Gianluca Papaleo


Protecting Digital Copyright in the Internet 612
Franco Frattolillo and Federica Landolfi


A JPEG-Compliant Method for Image Authentication and Recovery
Chiang-Lung Liu


A model with applications for data survivability in Critical Infrastructures
 MicheleAlbano, StefanoChessa and Roberto Di Pietro



Automatic Verification of Firewall Configurations with respect to Security Policy Requirements 640

 Soutaro Matsumoto and Adel Bouhoula



Copyright 2005 - 2009, Dynamic Publishers Inc., USA

No part of Journal of Information Assurance and Security may be reproduced or transmitted in any form or by any means without written permission from the publisher. Journal of Information Assurance and Security has been registered with the Copyright Clearance Center (CCC) Transactional Reporting Services. Consent is given for coping of articles for personal or internal use, or for the personal use of specific clients provided that the base fee $05.00 (per copy, per article) is paid directly to CCC, 27 Congress St., Salem, MA 01970, USA. For those organizations that have been granted a photo copy license by CCC, a separate system of payment has been arranged. The fee code for users of the Transactional Reporting Service is 1060 5369/93 $03.50.