Journal of Information Assurance and Security

Volume 5, 2010

  Page no.
   
   
A Compiler-Hardware Technique for Protecting Against Buffer Overflow Attacks
1
 Eugen Leontie, Gedare Bloom, Olga Gelbart, Bhagirath Narahari and Rahul Simha
 
 
 
Code Based Hashing Technique for Message Authentication Algorithms
9
Khaled Alghathbar
 
 
Formalizing Delegation and Integrating it into Role-Based Access Control Models
21
Ali E. Abdallah and Hassan Takabi  
   
Security Vulnerabilities In Wireless Sensor Networks: A Survey
31
T.Kavitha and D.Sridharan  
   
The Masked Code Book (MCB)
45
Mohamed Abo El-Fotouh and Klaus Diepold
 
   
A New Group Signature Scheme Based on the Discrete Logarithm (short paper)
54
Cheng-Chi Lee , Ting-Yi Chang and Min-Shiang Hwang  
   
Combined Shape and Texture Information for Palmprint Biometrics
58
Rafal Kozik and Michal Choras  
   
Covert File Transfer Protocol Based on the IP Record Route Option
64
Zouheir Trabelsi and Imad Jawhar  
   
Identifying the Cost of Security
74
Wouter de Bruijn, Marco R. Spruit and Maurits van den Heuvel  
   
Identity Based Proxy Blind Distributed Signature and Its Applications to Health Care Insurance Service Management
84
R. Anitha and R.S.Sankarasubramanian  
   
Impact of Wormhole Attacks and Performance Study of Different Routing Protocols in
Mobile Ad Hoc Networks
94
G.Padmavathi, P.Subashini and D.Devi Aruna  
   
A Novel Approach for Genetic Audio Watermarking
102
Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Farhang Jaryani, Hamed Taherdoost, Saman Shojae Chaeikar and Hossein Rouhani Zeidanloo  
   
Organizational Barriers to the Implementation of Security Engineering
112
Bryan Cline  
   
Webpage Source Encryption on Polymorphic Javascript Algorithm
121
Bai Zhongying and Qin Jiancheng  
   
Secure Key-Escrowless Explicit Authenticated Key Agreement Protocol in ID-based Public Key Cryptography
130
Mengbo Hou, Qiuliang Xu and Shanqing Guo  
   
Octagonal Search Algorithm with Early Termination for Fast Motion Estimation
on H.264
138
Dujuan Wang, Zhaopeng Cui, Guang Jiang, Chengke Wu  
   
Threats to Health Information Security
146
Ganthan Narayana Samy, Rabiah Ahmad and Zuraini Ismai  
   
Threats Identification in Healthcare Information Systems using Genetic Algorithm and Cox Regression
154
Rabiah Ahmad, Ganthan Narayana Samy, Nuzulha Khilwani Ibrahim, Peter A. Bath and Zuraini Ismail  
   
Action-Based Access Control for Web Services
162
Fenghua Li, Wei Wang , Jianfeng Ma and Haoxin Su  
   
One-way Hash Function Construction Based on Conservative Chaotic Systems
171
Qinghua Zhang, Han Zhang and Zhaohui Li  
   
A Low-cost RFID Authentication Protocol with Location Privacy Protection
179
Jun-Chao Lu, Yu-Yi Chen, Shin-I Chen and Jinn-Ke Jan  
   
A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation
187
Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang and Meng-Cheng Tsai  
   
Analysis of One-way Alterable Length Hash Function Based on Cell Neural Network
196
Qun-ting Yang, Tie-gang Gao, Li Fan and Qiao-lun Gu  
   
A Two-Factor User Authentication Scheme Providing Mutual Authentication and Key
Agreement over Insecure Channels
201
Chun-Ta Li, Cheng-Chi Lee and Lian-Jun Wang  
   
Proactive Verifiable Secret Sharing Scheme Using ECC Based Signcryption
209
Atanu Basu, Indranil Sengupta and Jamuna Kanta Sing  
   
The Design and Implementation of Security Defense Technology Based on Mandatory Running Control
218
Ke-He Wu, Tong Zhang and Fei Chen  
   
Fuzzy Intrusion Detection System via Data Mining Technique With Sequences of System Calls
224
Mohammad Akbarpour Sekeh, Mohd. Aizaini bin Maarof, Mohd.Yazid Idris and Malihe Motiei  
   
Using Improved GHSOM for Intrusion Detection
232
Yahui Yang, Dianbo Jiang and Min Xia  
   
Secure Access Control Scheme of RFID System Application
240
Yu-Chih Huang and Wen-Chung Kuo  
   
An Advanced IDS Management Architecture
246
Sebastian Roschke, Feng Cheng and Christoph Meinel  
   
Shouting Speech Detection and Understanding for Acoustic-Based Security System
256
Hiroaki Nanjo, Hiroshi Kawano, Hiroki MikamiI, Eri Ohmura and Takanobu Nishiura  
   
Performance Evaluation of DCA and SRC on a Single Bot Detection
265
Yousof Al-Hammadi, Uwe Aickelin and Julie Greensmith  
   
A Consideration on the Numbers of Relay Nodes and Encryption Required for Anonymous Communicaion System 3-Model Net
276
Kazuhiro Kono, Shinnosuke Nakano, Yoshimichi Ito, and Noboru Babaguchi  
   
Privacy Protection for Speech Information
284
Kazumasa Yamamoto and Seiichi Nakagawa  
   
SARoNGS: Shibboleth Access for Resources on the National Grid Service
293
Xiao Dong Wang, Mike Jones, Jens Jensen, Andrew Richards, David Wallom, Tiejun Ma, Robert Frank, David Spence, Steven Young, Claire Devereux and Neil Geddes  
   
Multi-tier Evaluation of Network Intrusion Detection Systems
301
Faeiz Alserhani, Monis Akhlaq, Irfan U Awan, John Mellor, Andrea J Cullen and Pravin Mirchandani  
   
Network Security Situation Awareness using Exponential and Logarithmic Analysis
311
Xiao-bin Tan, Gui-hong Qin, Yong Zhang and Ping Liang  
   
Secure Threshold Proxy Signature Scheme Based on RSA for Known Signers
319
Raman Kumar and Harsh Kumar Verma  
   
Information Security Audit: When is it Worth it?
327
Mathew A Thomas and Rahul R Marathe  
   
An Access Control Model Based Testing Approach for Smart Card Applications:
Results of the POS´E Project
335
P.-A. Masson and M.-L. Potet and J. Julliand and R. Tissot and G. Debois and
B. Legeard4 and B. Chetali and F. Bouquet and E. Jaffuel and
L. Van Aertrick and J. Andronick and A. Haddad
 
   
Modeling the Co-evololution DNS Worms and Anti-worms in IPv6 Networks
352
P. Kammas, T. Komninos, Y.C. Stamatiou  
   
Enhance ECDSA to Identity-based Proxy Signature Scheme
360
Ming-Hsin Chang , I-Te Chen and Ming-Te Chen  
   
Systematic Website Verification in Distributed Computing Environment
367
Seng-phil Hong, Ji-hee Jeoung  
   
Towards Ontology-Based Intelligent Model for Intrusion Detection and Prevention
376
Gustavo Isaza, Andrés Castillo, Manuel López and Luis Castillo  
   
Text Clustering for Digital Forensics Analysis
384
Sergio Decherchi, Simone Tacconi, Judith Redi, Fabio Sangiacomo, Alessio Leoncini and Rodolfo Zunino  
   
Measuring Impact of DDOS Attacks on Web Services
392
Monika Sachdeva, Gurvinder Singh, Krishan Kumar and Kuldip Singh  
   
Linear SVM for Underwater Magnetic Signals Based Port Protection
401
Davide Leoncini, Sergio Decherchi, Osvaldo Faggioni, Paolo Gastaldo, Maurizio Soldani and Rodolfo Zunino  
   
Score Normalization for Multimodal Recognition Systems
409
Luis Puente, María-Jesús Poza, Belén Ruiz and Ángel García-Crespo  
   
Behavior Analysis of Domain Servers Through Windows Security Event Log Mining
418
Urko Zurutuza, Rosa Basagoiti and Asier Aztiria  
   
A Location-Based Key Establishment Scheme for Static Wireless Sensor Networks with Multiple Base Stations
426
Ashok Kumar Das and Indranil Sengupta  
   
Ontology-based Security Policy Translation
437
Cataldo Basile, Antonio Lioy, Salvatore Scozzi, and Marco Vallini  
   
An Anomaly-Based Approach for Intrusion Detection in Web Traffic
446
Carmen Torrano-Gimenez, Alejandro Perez-Villegas, and Gonzalo Alvarez  
   
A Multi-Agent Based Solution to Detect and Block DoS Threats on Web Services
455
CristianI. Pinzón, Juan F. De Paz, Ana De Luis, Ana Gil, Javier Bajo  
   
A Comparison of Unsupervised Learning Techniques for Encrypted Traffic Identification
464
Carlos Bacquet , Kubra Gumus , Dogukan Tizer , A. Nur Zincir-Heywood , and Malcolm I. Heywood  
   
A Secure Two-Party Identity-Based Key Exchange Protocol Based on Elliptic Curve Discrete Logarithm Problem
473
Jayaprakash Kar and Banshidhar Majhi  
   
Arabic Domain Names: Analysis & Solution
483
Khaled Alghathbar  
   
An Eco-Defending Architecture for network security based on Immunity and Mobile Agents
492
Tongrang Fan, Yan Sun and Yongbin Zhao  
   
Detecting Stepping-Stone Intruders with Long Connection Chains
500
Shou-Hsuan Stephen Huang, Wei Ding, Matthew J. Hausknecht, Zach Riggle  
   
A Reputation Based Service Provider Selection System for Farmers
515
Bhavna Gupta, Harmeet Kaur and Punam Bedi  
   
Activity Governance for Managing Risks in Role Design for SSO Systems
516
Manish Gupta and Raj Sharman  
   
A Survey on Analytic Studies of Key Distribution Mechanisms in Wireless Sensor Networks
526
Ashok Kumar Das  
   
Using Intelligent Techniques to Extend the Applicability of Operating System Fingerprint Databases
554
Jo˜ao Paulo S. Medeiros, Agostinho M. Brito Jr., Paulo S. Motta Pires  
   
Automatic Validation of Firewall Configurations using SMT Solvers
561
Nihel Ben Youssef Ben Souayeh,Adel Bouhoula,Florent Jacquemard  
   
HRBAC: Historical Role-Based Access Control
569
Ali Hosseini and Mohammad Abdollahi Azgomi  
   
A Scheme for Execution of a Complex service in an Environment where Services are Vulnerable to Intrusion Attacks
579
Urjita Thakar, Nirmal Dagdee  
   
Parallel Hardware Algorithms & Designs for Elliptic Curves Cryptography to Improve Point Operations Computationsl
588
Qasem Abu Al-Haija' and Moahammad Al-Khatib  
   
   

Copyright ?2005 - 2010, Dynamic Publishers Inc., USA



No part of Journal of Information Assurance and Security may be reproduced or transmitted in any form or by any means without written permission from the publisher. Journal of Information Assurance and Security has been registered with the Copyright Clearance Center (CCC) Transactional Reporting Services. Consent is given for coping of articles for personal or internal use, or for the personal use of specific clients provided that the base fee $05.00 (per copy, per article) is paid directly to CCC, 27 Congress St., Salem, MA 01970, USA. For those organizations that have been granted a photo copy license by CCC, a separate system of payment has been arranged. The fee code for users of the Transactional Reporting Service is 1060 5369/93 $03.50.