Journal of Information Assurance and Security

Volume 4, Issue 4(Upcoming papers)


Special Issue on Access Control and Protcols  
(Editorial)

Guest Editors: Ning Zhang, University of Manchester, UK; Qi Shi, Liverpool John Moores University, UK

  Page no.

Using Qualia and Hierarchical Models in Malware Detection
247
 Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Mark E. Oxley, and Steven K. Rogers

 

 
 
ACMF: Framework for modeling attack based on Capability Model
256
  Navneet Kumar Pandey, S. K. Gupta and Shaveta Leekha

 

 


Analysis of User Command Behavior and Masquerade Detection   265

 Shou-Hsuan Stephen Huang and Han-Ching Wu

 

 
   
A Kernel Data Analysis Method  for Detecting Flood Attacks (brief paper)
274

  Jaeik Cho, Manhyun Chung and Jongsub Moon

 

 
   
1A security policy and Network Cartography based Intrusion Detection and Prevention Systems
279
  Sourour Meharouech, Adel Bouhoula, Tarek Abbes

 

 
   
Detection of Email Worm-Infected Machines on the Local Name Servers Using Time Series Analysis 292
Nikolaos Chatzis and Radu Popescu-Zeletin

   

Automated framework for policy optimization in firewalls and security gateways
301
   Gianluca Maiolini, Alessio Nicotra, Paolo Tornari, and Andrea Baiocchi

 

 
 
Abusing SIP authentication
311
  Humberto Abdelnur, Tigran Avanesov, Michael Rusinowitch and Radu State

 

 


Security Analysis of RBAC with Temporal Constraints A Model Checking Approach   319

  Samrat Mondal and Shamik Sural

 

 
   
A Novel Validation Method for Firewall Security Policy
329

  Ryma Abbassi and Sihem Guemara El Fatmi

 

 
   
1Towards a secure E-passport protocol based on biometrics
338
  Mohamed Abid and Hossam Afifi

 

 
   
Multiple Speaker Models and their Combination in Access Control Tasks 346
  Donato Impedovo and Mario Refice

   
A Security Framework and its Implementation in Fast Data Transfer Next Generation Protocol UDT 354
  Danilo Valeros Bernardo, Doan Hoang

 

 
   
A Purchase Protocol with Multichannel Authentication 361
  Hannan Xiao, Bruce Christianson, and Ying Zhang



Formal definition and comparison of access control models

372

  Lionel Habib, Mathieu Jaume and Charles Morisset

A Model for the Study of Privacy Issues in Secure Shell Connections
382
  Maurizio Dusi, Francesco Gringoli, Luca Salgarelli

 

 


Secure Connected Home: where the semantic technologies meet the device community 390

 Mohammad M. R. Chowdhury, Sarfraz Alam and Josef Noll

 

 
   
Identity Resolutionin Criminal Justice Data: An Application of NORA and SUDA
403

  Queen E. Booker

 

 
   
1Privacy Compliance with Web Services
412
  Peter Bodorik,  Dawn Jutla, and Indermohan Dhillon 

 

 
   
Determining the State Sequence to Maximize P(O,I│λ) on Distributed HMMs with Privacy 422
Sahin Renkes, Huseyin Polat and Yusuf Oysal

   

Geolocation-based Trust for Vanet’s Privacy
432
   Jetzabel Serna, Jesus Luna and Manel Medina

 

 
 
A Friend Mechanism for Mobile Ad Hoc Networks
440
 Shukor Abd Razak, Normalia Samian, Mohd. Aizaini Ma’arof, S. M. Furnell and N. L.    Clarke, P. J. Brooke

 

 


Trusted-Computing Technologies for the Protection of Critical Information Systems   449

 Antonio Lioy, Gianluca Ramunno and Davide Vernizzi

 

 
   
Evaluating the Device Reputation through Full Observation in MANETs
458

  G. Bella, G. Costantino and S. Riccobene

 

 
   
1Bidirectional Secret Communication by Quantum Collisions
466
 Fabio Antonio Bovino

 

 
   
A Watermarking Technique based on Visual Cryptography  (short paper) 470
 B. Surekha, G.N. Swamy, K. Srinivasa Rao and A. Ravi Kumar

   
Adapting and accelerating the Stream Cipher Algorithm "RC4" using "Ultra Gridsec" and "HIMAN" and use it to secure "HIMAN" Data 474
 Hisham A. Kholidy and  Khaled S. Alghathbar

 

 
   
Enhancing File Data Security in Linux Operating System by Integrating Secure File System 484
 Rajesh Kumar Pal and Indranil Sengupta



Challenges for Security Typed Web Scripting Languages Design

493

 Doaa Hassan, Sherif El- Kassas and Ibrahim Ziedan

   
Security Issues in Drinking Water Distribution Networks
500

 Demetrios G. Eliades, Marios M. Polycarpou and Bambos Charalambous

 

 
   
1Protection of Real and Artwork Human Objects based on a Chaotic Moments Modulation Method
509
 Klimis Ntalianis, Paraskevi Tzouveli, Stefanos Kollias and Athanasios Drigas

 

 
   
Security Requirements in Judicial Information Systems: Experience from a European Project for Judicial Cross-Border Collaboration 519
 George Eleftherakis, Konstantinos Rousis, Mauro Cislaghi, Roberto Mazzilli and    Sara Ferri

   
Secure Communication for Hierarchical Groups 530
 Sigurd Eskeland and Vladimir Oleshchuk

 

 
   
Time Domain Performances Analysis of Underwater Magnetic SIMAN Systems for Port Protection 538
  Osvaldo Faggioni, Maurizio Soldani, Davide Leoncini, Amleto Gabellone and Paolo   V. Maggiani



The Pushdown Attack and Attacking the Substitution Cipher Chaining mode (SCC)

546

 Mohamed Abo El-Fotouh and Klaus Diepold

Usability Evaluation of Identity Management Schemes in Three Virtual Organization Architectures
560
  Ali E. Abdallah, Ali N. Haidar

 

 


Loss of Self-Similarity Detection Using Exact and Asymptotic Self-Similarity Models 571

 Mohd Fo’ad Rohani, Mohd Aizaini Maarof, Ali Selamat and Houssain Kettani

 

 
   
FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks
582

  Devesh Jinwala, Dhiren Patel and Kankar Dasgupta

 

 
   
1Statistical anomaly detection on real e-mail traffic
604
 Maurizio Aiello, Davide Chiarella and Gianluca Papaleo

 

 
   
Protecting Digital Copyright in the Internet 612
Franco Frattolillo and Federica Landolfi

   

A JPEG-Compliant Method for Image Authentication and Recovery
622
Chiang-Lung Liu

 

 
 
A model with applications for data survivability in Critical Infrastructures
629
 MicheleAlbano, StefanoChessa and Roberto Di Pietro

 

 


Automatic Verification of Firewall Configurations with respect to Security Policy Requirements 640

 Soutaro Matsumoto and Adel Bouhoula

 

 
   
   

Copyright 2005 - 2009, Dynamic Publishers Inc., USA



No part of Journal of Information Assurance and Security may be reproduced or transmitted in any form or by any means without written permission from the publisher. Journal of Information Assurance and Security has been registered with the Copyright Clearance Center (CCC) Transactional Reporting Services. Consent is given for coping of articles for personal or internal use, or for the personal use of specific clients provided that the base fee $05.00 (per copy, per article) is paid directly to CCC, 27 Congress St., Salem, MA 01970, USA. For those organizations that have been granted a photo copy license by CCC, a separate system of payment has been arranged. The fee code for users of the Transactional Reporting Service is 1060 5369/93 $03.50.