Journal Contents: International Journal of Information Security and Privacy (IJISP)

Volume 12 (2018)
Issue 1
Special Issue on Security Mechanisms
Editorial Preface
G. Geetha (Lovely Professional University, Punjab, India)
Article 1
A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security (pages 1-12)
Ranjeet Kumar Singh (National Institute of Technology, Department of Computer Applications, Jamshedpur, India), Dilip Kumar Shaw (National Institute of Technology, Department of Computer Applications, Jamshedpur, India)
Article 2
Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification (pages 13-28)
Gautam Kumar (Jaypee University of Information Technology, Solan, India), Hemraj Saini (Jaypee University of Information Technology, Solan, India)
Article 3
CIAS: A Comprehensive Identity Authentication Scheme for Providing Security in VANET (pages 29-41)
Arun Malik (Lovely Professional University, Punjab, India), Babita Pandey (Lovely Professional University, Punjab, India)
Article 4
Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN (pages 42-52)
Geetanjali Rathee (Jaypee University of Information Technology, Solan, India), Hemraj Saini (Jaypee University of Information Technology, Solan, India)
Article 5
Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN (pages 53-62)
Gulshan Kumar (Lovely Professional University, Punjab, India), Rahul Saha (Lovely Professional University, Punjab, India), Mandeep Singh (Lovely Professional University, Punjab, India), Mritunjay Kumar Rai (Lovely Professional University, Punjab, India)
Article 6
Performance Evaluation of SHA-3 Final Round Candidate Algorithms on ARM Cortex–M4 Processor (pages 63-73)
Rajeev Sobti (Lovely Professional University, Punjab, India), Geetha Ganesan (Lovely Professional University, Punjab, India)
Article 7
A Proposed SOAP Model in WS-Security to Avoid Rewriting Attacks and Ensuring Secure Conversation (pages 74-88)
Rajni Mohana (Jaypee University of Information Technology, Solan, India)
Article 8
Breaching Security of Full Round Tiny Encryption Algorithm (pages 89-98)
Puneet Kumar Kaushal (Lovely Professional University, Punjab, India), Rajeev Sobti (Lovely Professional University, Punjab, India)
Issue 2
Special Issue on Security Challenges in Internet of Things (IoT)
Guest Editorial Preface
Nishtha Kesswani (Central University of Rajasthan, Ajmer, India), C. P. Gupta (Department of Computer Engineering, Rajasthan Technical University, Kota, India), Frank Lin (California State University San Bernardino (CSUSB), San Bernardino, USA)
Article 1
Privacy Preserving and Efficient Outsourcing Algorithm to Public Cloud: A Case of Statistical Analysis (pages 1-25)
Malay Kumar (Department of Computer Science and Engineering, National Institute of Technology, Raipur, India), Manu Vardhan (Department of Computer Science and Engineering, National Institute of Technology, Raipur, India)
Article 2
Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN (pages 26-37)
Geetanjali Rathee (Jaypee University of Information Technology, India), Hemraj Saini (Jaypee University of Information Technology, India)
Article 3
A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks (pages 38-45)
Jhum Swain (Department of Computer Science and Engineering, Siksha ‘O' Anusandhan University (Deemed), Bhubaneswar, India), Binod Kumar Pattanayak (Department of Computer Science and Engineering, Siksha ‘O' Anusandhan University (Deemed), Bhubaneswar, Odisha, India), Bibudhendu Pati (Department of Computer Science and Engineering, C. V. Raman College of Engineering, Bhubaneswar, India)
Article 4
An Improvised Framework for Privacy Preservation in IoT (pages 46-63)
Muzzammil Hussain (Department of Computer Science and Engineering, Central University of Rajasthan, Ajmer, India), Neha Kaliya (Department of Computer Science and Engineering, Central University of Rajasthan, Ajmer, India)
Issue 3
Article 1
A Comparative Study of Privacy Protection Practices in the US, Europe, and Asia (pages 1-15)
Noushin Ashrafi (University of Massachusetts Boston, Boston, USA), Jean-Pierre Kuilboer (University of Massachusetts Boston, Boston, USA)
Article 2
SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm (pages 16-26)
Bouchra Echandouri (Faculty of Sciences, Mohammed V University, Rabat, Morocco), Fouzia Omary (Faculty of Sciences, Mohammed V University, Rabat, Morocco), Fatima Ezzahra Ziani (Faculty of Sciences, Mohammed V University, Rabat, Morocco), Anas Sadak (Faculty of Sciences, Mohammed V University, Rabat, Morocco)
Article 3
Improving Power Analysis Peak Distribution Using Canberra Distance to Address Ghost Peak Problem (pages 27-41)
Hridoy Jyoti Mahanta (Computer Science and Engineering, Assam University, Silchar, India), Ajoy Kumar Khan (Computer Science and Engineering, Assam University, Silchar, India)
Article 4
A Literature Review on Image Encryption Techniques (pages 42-83)
S Geetha (School of Computing Science and Engineering, Vellore Institute of Technology Chennai Campus, Chennai, India), P Punithavathi (School of Computing Science and Engineering, Vellore Institute of Technology Chennai Campus, Chennai, India), A Magnus Infanteena (School of Computing Science and Engineering, Vellore Institute of Technology Chennai Campus, Chennai, India), S Siva Sivatha Sindhu (Shan Systems LLC, Jersey City, USA)
Article 5
Blind Image Source Device Identification: Practicality and Challenges (pages 84-99)
Udaya Sameer Venkata (Department of Computer Science and Engineering, National Institute of Technology, Rourkela, India), Ruchira Naskar (Department of Computer Science and Engineering, National Institute of Technology, Rourkela, India)
Article 6
Misuse of ‘Break-the-Glass' Policies in Hospitals: Detecting Unauthorized Access to Sensitive Patient Health Data (pages 100-122)
Benjamin Stark (Neu-Ulm University of Applied Sciences, Neu-Ulm, Germany), Heiko Gewald (Neu-Ulm University of Applied Sciences, Neu-Ulm, Germany), Heinrich Lautenbacher (University Hospital Tübingen, Tübingen, Germany), Ulrich Haase (Klinikum Stuttgart, Stuttgart, Germany), Siegmar Ruff (DSM DatenSchutzManagement Schurer GmbH, Tübingen, Germany)
Article 7
A Survey of Security Models Using Effective Moving Target Defenses (pages 123-140)
B S Kiruthika Devi (Vellore Institute of Technology Chennai, Chennai, India), T. Subbulakshmi (Vellore Institute of Technology Chennai, Chennai, India), KV Mahesh Babu (Vellore Institute of Technology Chennai, Chennai, India)
Article 8
Association Rule Hiding in Privacy Preserving Data Mining (pages 141-163)
S. Vijayarani Mohan (Department of Computer Science, Bharathiar University, Coimbatore, India), Tamilarasi Angamuthu (Department of MCA, Kongu Engineering College, Erode, India)
Volume 11 (2017)
Issue 1
Article 1
Privacy and Territoriality Issues in an Online Social Learning Portal (pages 1-17)
Mohd Anwar (North Carolina A&T State University, Greensboro, NC, USA), Peter Brusilovsky (University of Pittsburgh, Pittsburgh, PA, USA)
Article 2
A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social Bees (pages 18-34)
Mohamed Amine Boudia (Dr. Moulay Tahar University of Saida, Saida, Algeria), Reda Mohamed Hamou (GeCoDe Laboratory, Department of Computer Science, Dr. Moulay Tahar University of Saida, Saida, Algeria), Abdelmalek Amine (GeCoDe Laboratory, Department of Computer Science, Dr. Moulay Tahar University of Saida, Saida, Algeria)
Article 3
Detecting Wormhole Attack on Data Aggregation in Hierarchical WSN (pages 35-51)
Mukesh Kumar (National Institute of Technology, Hamirpur, India), Kamlesh Dutta (National Institute of Technology, Hamirpur, India)
Article 4
A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes (pages 52-64)
Emmy Mugisha (Nanjing University of Science and Technology, Nanjing, China), Gongxuan Zhang (Nanjing University of Science and Technology, Nanjing, China), Maouadj Zine El Abidine (Nanjing University of Science and Technology, Nanjing, China), Mutangana Eugene (Nanjing University of Science and Technology, Nanjing, China)
Issue 2
Special Issue on Cyber Security and Privacy in Communication Networks (Part 1)
Guest Editorial Preface
C. P. Gupta (Rajasthan Technical University, Kota, India), Nishtha Kesswani (Central University of Rajasthan, Ajmer, India)
Article 1
An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password (pages 1-10)
Prakash Mohan (Karpagam College of Engineering (Autonomous), Coimbatore, India), Saravanakumar Chelliah (St. Joseph's Institute of Technology, Chennai, India)
Article 2
Bit Forwarding 3-Bits Technique for Efficient Modular Exponentiation (pages 11-24)
Satyanarayana Vollala (National Institute of Technology, Tiruchirappalli, India), B. Shameedha Begum (National Institute of Technology, Tiruchirappalli, India), Amit D. Joshi (National Institute of Technology, Tiruchirappalli, India), N. Ramasubramanian (National Institute of Technology, Tiruchirappalli, India)
Article 3
Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies (pages 25-37)
Regner Sabillon (Universitat Oberta de Catalunya, Barcelona, Spain), Jordi Serra-Ruiz (Universitat Oberta de Catalunya, Barcelona, Spain), Victor Cavaller (Universitat Oberta de Catalunya, Barcelona, Spain), Jeimy J. Cano (Universidad de los Andes, Bogota, Colombia)
Article 4
PKI Deployment Challenges and Recommendations for ICS Networks (pages 38-48)
Nandan Rao (ABB Global Industries and Services Pvt Ltd., Bangalore, India), Shubhra Srivastava (ABB Global Industries and Services Pvt Ltd., Bangalore, India), Sreekanth K.S. (ABB Global Industries and Services Pvt Ltd., Bangalore, India)
Article 5
Framework to Secure Browser Using Configuration Analysis (pages 49-63)
Harshad Suryakant Wadkar (Defence Institute of Advanced Technology, Pune, India), Arun Mishra (Defence Institute of Advanced Technology, Pune, India), Arati M. Dixit (Savitribai Phule Pune University, Pune, India)
Issue 3
Special Issue Cyber Security and Privacy in Communication Networks (Part 2)
Guest Editorial Preface
C. P. Gupta (Rajasthan Technical University, Kota, India), Nishtha Kesswani (Central University of Rajasthan, Ajmer, India)
Article 1
A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority (pages 1-14)
Sarvesh Tanwar (Mody University of Science and Technology, Lakshmangarh, India), Anil Kumar (Mody University of Science and Technology, Lakshmangarh, India)
Article 2
Identification of Cryptographic Vulnerability and Malware Detection in Android (pages 15-28)
Anjali Kumawat (Government Women Engineering College, Ajmer, India), Anil Kumar Sharma (Government Women Engineering College, Ajmer, India), Sunita Kumawat (Government Women Engineering College, Ajmer, India)
Article 3
Malware Detection by Static Checking and Dynamic Analysis of Executables (pages 29-41)
Deepti Vidyarthi (Defence Institute of Advanced Technology, Pune, India), S.P. Choudhary (Defence Institute of Advanced Technology, Pune, India), Subrata Rakshit (Center of Artificial Intelligence & Robotics, Bangalore, India), C.R.S. Kumar (Defence Institute of Advanced Technology, Pune, India)
Article 4
Localization in Wireless Sensor Networks Using Soft Computing Approach (pages 42-53)
Sunil Kumar Singh (National Institute of Technology Patna, Patna, India), Prabhat Kumar (National Institute of Technology Patna, India), Jyoti Prakash Singh (National Institute of Technology Patna, Patna, India)
Article 5
A Secure Cloud Storage using ECC-Based Homomorphic Encryption (pages 54-62)
Daya Sagar Gupta (Indian Institute of Technology (ISM) Dhanbad, Dhanbad, India), G. P. Biswas (Indian Institute of Technology (ISM) Dhanbad, Dhanbad, India)
Article 6
Honeypot Baselining for Zero Day Attack Detection (pages 63-74)
Saurabh Chamotra (CDAC, Mohali, India), Rakesh Kumar Sehgal (CDAC, Mohali, India), Ram Swaroop Misra (CDAC, Mohali, India)
Issue 4
Article 1
A Survey on Denial of Service Attacks and Preclusions (pages 1-15)
Nagesh K. (Pondicherry Engineering College, Department of Computer Science and Engineering, Puducherry, India), Sumathy R. (Pondicherry Engineering College, Department of Computer Science and Engineering, Puducherry, India), Devakumar P. (Pondicherry Engineering College, Department of Computer Science and Engineering, Puducherry, India), Sathiyamurthy K. (Pondicherry Engineering College, Department of Computer Science and Engineering, Puducherry, India)
Article 2
Detection of Drive-by Download Attacks Using Machine Learning Approach (pages 16-28)
Monther Aldwairi (Jordan University of Science and Technology, Department of Network Engineering and Security, Irbid, Jordan), Musaab Hasan (Zayed University, College of Technological Innovation, Abu Dhabi, U.A.E), Zayed Balbahaith (Zayed University, College of Technological Innovation, Abu Dhabi, U.A.E)
Article 3
Performance Evaluation of Web Server's Request Queue against AL-DDoS Attacks in NS-2 (pages 29-46)
Manish Kumar (Punjabi University, Department of Computer Engineering, Patiala, India), Abhinav Bhandari (Punjabi University, Department of Computer Engineering, Patiala, India)
Article 4
Malware Methodologies and Its Future: A Survey (pages 47-64)
Chandan Kumar Behera (Andhra Univeristy, Visakhapatnam, India), D. Lalitha Bhaskari (Andhra Univeristy, Visakhapatnam, India)
Volume 10 (2016)
Issue 1
Article 1
Combination of Access Control and De-Identification for Privacy Preserving in Big Data (pages 1-27)
Amine Rahmani (GeCoDe Laboratory, Department of Computer Sciences, Dr. Tahar Moulay University of Saida, Algeria), Abdelmalek Amine (GeCoDe Laboratory, Department of Computer Sciences, Dr. Tahar Moulay University of Saida, Algeria), Reda Mohamed Hamou (GeCoDe Laboratory, Department of Computer Sciences, Dr. Tahar Moulay University of Saida, Algeria)
Article 2
The Compliance of IT Control and Governance: A Case of Macao Gaming Industry (pages 28-44)
Colin Lai (Macao Polytechnic Institute, Macao), Hung-Lian Tang (Eastern Michigan University, Ypsilanti, MI, USA), J. Michael Tarn (Department of Business Information Systems, Western Michigan University, Kalamazoo, MI, USA), Sock Chung (Eastern Michigan University, Ypsilanti, MI, USA)
Article 3
A Clustering Approach Using Fractional Calculus-Bacterial Foraging Optimization Algorithm for k-Anonymization in Privacy Preserving Data Mining (pages 45-65)
Pawan R. Bhaladhare (SNJB's College of Engineering, Chandwad, India), Devesh C. Jinwala (Department of Computer Engineering, Sardar Vallabhbhai National Institute of Technology, Surat, India)
Issue 2
Article 1
A Smart Grid Security Architecture for Wireless Advanced Metering Infrastructure (AMI) (pages 1-10)
Aftab Ahmad (John Jay College of Criminal Justice, City University of New York (CUNY), New York, NY, USA)
Article 2
Are the Payments System and e-Banking in India Safer than in other SAARC Members? (pages 11-25)
Rituparna Das (University of Petroleum and Energy Studies, Dehradun, India)
Article 3
Analysis of Existing Trust Based Routing Schemes Used in Wireless Network (pages 26-40)
Kajal S. Patel (Government Engineering College, Rajkot, India), Jagdish S. Shah (Government Engineering College, Patan, India)
Article 4
Using Crowd Sourcing to Analyze Consumers' Response to Privacy Policies of Online Social Network and Financial Institutions at Micro Level (pages 41-63)
Shaikha Alduaij (University of Maryland, Baltimore County (UMBC), Baltimore, MD, USA), Zhiyuan Chen (University of Maryland, Baltimore County (UMBC), Baltimore, MD, USA), Aryya Gangopadhyay (University of Maryland, Baltimore County (UMBC), Baltimore, MD, USA)
Issue 3
Special Issue on Security of Information and Networks
Guest Editorial Preface
Atilla Elçi (Electrical and Electronics Engineering Department, Aksaray University, Aksaray, Turkey), Oleg Borisovich Makarevich (Southern Federal University, Taganrog, Russia), Manoj S. Gaur (Malaviya National Institute of Technology, Jaipur, India), Mehmet A. Orgun (Department of Computing, Macquarie University, Sydney, Australia)
Article 1
Threshold Secret Sharing Scheme for Compartmented Access Structures (pages 1-9)
P. Mohamed Fathimal (Manonmaniam Sundaranar University, Tirunelveli, India), P. Arockia Jansi Rani (Manonmaniam Sundaranar University, Tirunelveli, India)
Article 2
iPhone Forensics: Recovering Investigative Evidence using Chip-off Method (pages 10-24)
Nilay R. Mistry (Institute of Forensic Science, Gandhinagar, India), Binoj Koshy (Institute of Forensic Science, Gandhinagar, India), Mohindersinh Dahiya (Institute of Forensic Science, Gandhinagar, India), Chirag Chaudhary (Institute of Forensic Science, Gandhinagar, India), Harshal Patel (Institute of Forensic Science, Gandhinagar, India), Dhaval Parekh (Institute of Forensic Science, Gandhinagar, India), Jaidip Kotak (Institute of Forensic Science, Gandhinagar, India), Komal Nayi (Institute of Forensic Science, Gandhinagar, India), Priyanka Badva (Institute of Forensic Science, Gandhinagar, India)
Article 3
Preventing Identity Disclosure in Social Networks Using Intersected Node (pages 25-41)
Amardeep Singh (PEC University of Technology, Chandigarh, India), Divya Bansal (PEC University of Technology, Chandigarh, India), Sanjeev Sofat (PEC University of Technology, Chandigarh, India)
Article 4
IPHDBCM: Inspired Pseudo Hybrid DNA Based Cryptographic Mechanism to Prevent Against Collabrative Black Hole Attack in Wireless Ad hoc Networks (pages 42-66)
Erukala Suresh Babu (K.L. University, Vijayawada, India), C. Nagaraju (Y.V. University, Proddutur, India), M.H.M. Krishna Prasad (J.N.T. University, Kakinada, India)
Article 5
Metamorphic malware detection using opcode frequency rate and decision tree (pages 67-86)
Mahmood Fazlali (Department of Computer Science, Cyberspace Research Institute, Shahid Beheshti University, GC, Tehran, Iran), Peyman Khodamoradi (Department of Computer Engineering, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran), Farhad Mardukhi (Department of Computer Engineering, Razi University, Kermanshah, Iran), Masoud Nosrati (Department of Computer Engineering, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran), Mohammad Mahdi Dehshibi (Pattern Research Center, Tehran, Iran)
Issue 4
Article 1
Hybrid Intrusion Detection Framework for Ad hoc networks (pages 1-32)
Abdelaziz Amara Korba (Networks and Systems Laboratory (LRS), Badji Mokhtar-Annaba University, Annaba, Algeria), Mehdi Nafaa (Networks and Systems Laboratory (LRS), Badji Mokhtar-Annaba University, Annaba, Algeria), Salim Ghanemi (Embedded Systems Laboratory (LASE), Badji Mokhtar-Annaba University, Annaba, Algeria)
Article 2
A Framework for Protecting Users' Privacy in Cloud (pages 33-43)
Adesina S. Sodiya (Department of Computer Science, Federal University of Agriculture, Abeokuta, Nigeria), Adegbuyi B. (Department of Computer Science, Federal University of Agriculture, Abeokuta, Nigeria)
Article 3
Creating Time-Limited Attributes for Time-Limited Services in Cloud Computing (pages 44-57)
Azin Moradbeikie (International University of Imamreza, Mashhad, Iran), Saied Abrishami (Ferdowsi University of Mashhad, Mashhad, Iran), Hasan Abbasi (International University of Imamreza, Mashhad, Iran)
Article 4
Accurate Classification Models for Distributed Mining of Privately Preserved Data (pages 58-73)
Sumana M. (M. S. Ramaiah Institute of Technology, Bangalore, India), Hareesha K.S. (Manipal Institute of Technology, Udupi, India)
Volume 9 (2015)
Issue 1
Article 1
Client-Side Detection of Clickjacking Attacks (pages 1-25)
Hossain Shahriar (Department of Computer Science, Kennesaw State University, Kennesaw, GA, USA), Hisham M. Haddad (Kennesaw State University, Kennesaw, GA, USA)
Article 2
A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour (pages 26-46)
Teodor Sommestad (Swedish Defence Research Agency (FOI), Linköping, Sweden), Henrik Karlzén (Swedish Defence Research Agency (FOI), Linköping, Sweden), Jonas Hallberg (Swedish Defence Research Agency (FOI), Linköping, Sweden)
Article 3
Short Online/Off-line Signature Scheme for Wireless Sensor Networks (pages 47-61)
Anser Ghazzaal Ali Alquraishee (Department of Information Systems, King Abdulaziz University, Jeddah, Saudi Arabia), Jayaprakash Kar (Department of Information Systems, King Abdulaziz University, Jeddah, Saudi Arabia), Naomie Salim (Faculty of Computing Universiti Teknologi Malaysia, Sekudai, Malaysia)
Article 4
Disassociations in Security Policy Lifecycles (pages 62-77)
Michael Lapke (University of Mary Washington, Fredericksburg, VA, USA), Gurpreet Dhillon (School of Business, Virginia Commonwealth University, Richmond, VA, USA)
Issue 2
Special Issue on Trust, Security and Privacy in Computing and Communications (Part 1)
Guest Editorial Preface
Zheng Yan (Xidian University, Xi'an, China and Aalto University, Espoo, Finland), Peter Mueller (IBM Research, Zurich, Switzerland), Xinyi Huang (Fujian Normal University, Fuzhou, China), Xiangjian (Sean) He (University of Technology, Sydney, Australia), Marinella Petrocchi (Istituto di Informatica e Telematica, Pisa, Italy)
Article 1
Several Oblivious Transfer Variants in Cut-and-Choose Scenario (pages 1-12)
Chuan Zhao (School of Computer Science and Technology, Shandong University, Jinan, China), Han Jiang (School of Computer Science and Technology, Shandong University, Jinan, China), Qiuliang Xu (School of Computer Science and Technology, Shandong University, Jinan, China), Xiaochao Wei (School of Computer Science and Technology, Shandong University, Jinan, China), Hao Wang (School of Computer Science and Technology, Shandong University, Jinan, China)
Article 2
Trust of the Same: Rethinking Trust and Reputation Management from a Structural Homophily Perspective (pages 13-30)
Aminu Bello Usman (School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand), William Liu (School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand), Quan Bai (School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand), Ajit Narayanan (School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand)
Article 3
Cooperative Transmission against Impersonation Attack and Authentication Error in Two-Hop Wireless Networks (pages 31-59)
Weidong Yang (Key Laboratory of Grain Information Processing and Control Ministry of Education, School of Information Science and Engineering, Henan University of Technology, Zhengzhou, China), Liming Sun (Beijing Key Laboratory of IOT information security technology, Institute of Information Engineering, CAS, Beijing, China), Zhenqiang Xu (Zhenqiang Xu, School of Information Science and Engineering, Henan University of Technology, Zhengzhou, China)
Article 4
Observations on Genderwise Differences among University Students in Information Security Awareness (pages 60-74)
Ali Farooq (Department of Information Technology, University of Turku, Turku, Finland), Johanna Isoaho (Department of Information Technology, University of Turku, Turku, Finland), Seppo Virtanen (Department of Information Technology, University of Turku, Turku, Finland), Jouni Isoaho (Department of Information Technology, University of Turku, Turku, Finland)
Issue 3
Special Issue on Trust, Security, and Privacy in Computing and Communications (Part 2)
Guest Editorial Preface
Zheng Yan (Xidian University, Xi'an, China and Aalto University, Espoo, Finland), Peter Mueller (IBM Research, Zurich, Switzerland), Xinyi Huang (Fujian Normal University, Fuzhou, China), Xiangjian (Sean) He (University of Technology, Sydney, Australia), Marinella Petrocchi (Istituto di Informatica e Telematica, Pisa, Italy)
Article 1
An Efficient, Anonymous and Unlinkable Incentives Scheme (pages 1-20)
Milica Milutinovic (KU Leuven, Leuven, Belgium), Andreas Put (KU Leuven, Leuven, Belgium), Bart De Decker (KU Leuven, Leuven, Belgium)
Article 2
A Novel OpenFlow-Based DDoS Flooding Attack Detection and Response Mechanism in Software-Defined Networking (pages 21-40)
Rui Wang (Shandong University, Jinan, China), Zhiyong Zhang (Shandong University, Jinan, China), Lei Ju (Shandong University, Jinan, China), Zhiping Jia (Shandong University, Jinan, China)
Article 3
Signature Restoration for Enhancing Robustness of FPGA IP Designs (pages 41-56)
Jing Long (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China), Dafang Zhang (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China), Wei Liang (College of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China), Xia'an Bi (College of Mathematics and Computer Science, Hunan Normal University, Changsha, China)
Article 4
Authentication in Ubiquitous Networking (pages 57-83)
Abdullah Mohammed Almuhaideb (College of Computer Science and IT, King Faisal University, Alahsa, Saudi Arabia), Bala Srinivasan (Faculty of Information Technology, Monash University, Melbourne, Australia)
Article 5
Software Defined Intelligent Building (pages 84-99)
Rui Yang Xu (Xi'an Jiaotong-Liverpool University, Suzhou, China), Xin Huang (Xi'an Jiaotong-Liverpool University, Suzhou, China), Jie Zhang (Xi'an Jiaotong-Liverpool University, Suzhou, China), Yulin Lu (Xi'an Jiaotong-Liverpool University, Suzhou, China), Ge Wu (University of Wollongong, Australia), Zheng Yan (Aalto University, Espoo, Finland & Xidian University, China)
Issue 4
Article 1
Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group (pages 1-19)
S. Selva Nidhyananthan (Mepco Schlenk Engineering College, Sivakasi, India), Prasad M. (Mepco Schlenk Engineering College, Sivakasi, India), Shantha Selva Kumari R. (Mepco Schlenk Engineering College, Sivakasi, India)
Article 2
A New Meta-Heuristic based on Human Renal Function for Detection and Filtering of SPAM (pages 26-58)
Mohamed Amine Boudia (GeCode Laboratory, Department of Computer Science, Tahar Moulay University of Saida Algeria, Saida, Algeria), Reda Mohamed Hamou (GeCoDe Laboratory, Department of Computer Science, Tahar Moulay University of Saida Algeria, Saida, Algeria), Abdelmalek Amine (GeCoDe Laboratory, Department of Computer Science, Tahar Moulay University of Saida Algeria, Saida, Algeria)
Article 3
Secure Group Message Transfer Stegosystem (pages 59-76)
Mahinder Pal Singh Bhatia (Department of Computer Engineering, Netaji Subhas Institute of Technology, New Delhi, India), Manjot Kaur Bhatia (Department of Computer Science, University of Delhi, New Delhi, India), Sunil Kumar Muttoo (Department of Computer Science, University of Delhi, New Delhi, India)
Volume 8 (2014)
Issue 1
Article 1
Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective (pages 1-18)
Mathew Nicho (University of Dubai, Dubai, UAE), Shafaq Khan (University of Dubai, Dubai, UAE)
Article 2
A Covert Communication Model-Based on Image Steganography (pages 19-37)
Mamta Juneja (UIET, Panjab University, Chandigarh, India)
Article 3
An Integrated Dynamic Model Optimizing the Risk on Real Time Operating System (pages 38-61)
Prashanta Kumar Patra (Department of CSE, College of Engineering and Technology, Biju Patnaik University of Technology (BPUT), Bhubaneswar, India), Padma Lochan Pradhan (Department of CSE, Central Institute of Technology, Raipur, India)
Article 4
An Efficient Intrusion Alerts Miner for Forensics Readiness in High Speed Networks (pages 62-78)
Aymen Akremi (CES Research Unit, National School of Engineers of Sfax, Sfax, Tunisia), Hassen Sallay (Al Imam Mohammad Ibn Saud Islamic University. (IMSIU), Riyadh, Saudi Arabia), Mohsen Rouached (College of Computers and Information Technology, Taif University, Taif, Saudi Arabia)
Issue 2
Article 1
A Firegroup Mechanism to Provide Intrusion Detection and Prevention System Against DDos Attack in Collaborative Clustered Networks (pages 1-18)
M. Poongodi (Anna University, Chennai, India), S. Bose (Anna University, Chennai, India)
Article 2
Classification of DOS Attacks Using Visualization Technique (pages 19-32)
Mohamed Cheikh (Computer Science Department, Constantine 2 University, Constantine, Algeria), Salima Hacini (TLSI department, Constantine 2 University, Constantine, Algeria), Zizette Boufaida (Computer Science Department, Constantine 2 University, Constantine, Algeria)
Article 3
Empirical Analysis of Software Piracy in Asia (Japan VS. Vietnam): An Exploratory Study (pages 33-54)
Xiang Fang (Department of Information Systems and Analytics, Miami University, Oxford, OH, USA), Sooun Lee (Department of Information Systems and Analytics, Miami University, Oxford, OH, USA)
Article 4
Data Hiding Method Based on Inter-Block Difference in Eight Queens Solutions and LSB Substitution (pages 55-68)
Vinay Kumar (Vivekananda Institute of Professional Studies, Guru Gobind Singh Indraprastha University, Delhi, India), Abhishek Bansal (Department of Computer Science, Indira Gandhi National Tribal University, Amarkantak, India), Sunil Kumar Muttoo (Department of Computer Science, University of Delhi, Delhi, India)
Issue 3
Article 1
Users' Perception of Security for Mobile Communication Technology (pages 1-12)
Mohanad Halaweh (University of Dubai, UAE)
Article 2
A New Fuzzy-Based Approach for Anonymity Quantification in E-Services (pages 13-38)
Wiem Hammami (Higher Institute of Management of Tunis, University of Tunis, Tunis, Tunisia), Ilhem Souissi (National School of Computer Science, Tunis, Tunisia), Lamjed Ben Said (Higher Institute of Management of Tunis, University of Tunis, Tunis, Tunisia)
Article 3
Balanced Approach for Hiding Sensitive Association Rules in Data Sharing Environment (pages 39-62)
Janakiramaiah Bonam (DVR & Dr HS MIC College of Technology, Kanchikacherla, India), Ramamohan Reddy (Sri Venkateswara University, Tirupati, India)
Article 4
TCP/IP Reassembly in Network Intrusion Detection and Prevention Systems (pages 63-76)
Xiaojun Wang (Dublin City University, Dublin, Ireland), Brendan Cronin (Dublin City University, Dublin, Ireland)
Issue 4
Article 1
A New Negative Selection Algorithm for Adaptive Network Intrusion Detection System (pages 1-25)
Chikh Ramdane (Sétif 1 University, Sétif, Algeria), Salim Chikhi (MISC Laboratory, Constantine 2 University, Constantine, Algeria)
Article 2
Toward Proactive Mobile Tracking Management (pages 26-43)
Hella Kaffel Ben Ayed (National School of Computer Science, University of Manouba, Manouba, Tunisia), Asma Hamed (National School of Computer Science, University of Manouba, Manouba, Tunisia)
Article 3
An Adaptive Trustworthiness Modelling Approach for Ubiquitous Software Systems (pages 44-61)
Amr Ali-Eldin (Computer Engineering and Control Systems Department, Faculty of Engineering, Mansoura University, Mansoura, Egypt), Jan Van Den Berg (Faculty of Technology, Policy and Management, Delft University of Technology, Delft, Netherlands), Semir Daskapan (Faculty of Technology, Policy and Management, Delft University of Technology, Delft, Netherlands)
Article 4
A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks (pages 62-102)
Piotr Książak (Department of Computing, Letterkenny Institute of Technology, Letterkenny, Ireland), William Farrelly (Department of Computing, Letterkenny Institute of Technology, Letterkenny, Ireland), Kevin Curran (Faculty of Computing & Engineering, Ulster University, Londonderry, UK)
Volume 7 (2013)
Issue 1
Article 1
Spearing High Net Wealth Individuals: The Case of Online Fraud and Mature Age Internet Users (pages 1-15)
Nigel Martin (Research School of Accounting and Business Information Systems, The Australian National University, Canberra, ACT, Australia), John Rice (Department of International Business and Asian Studies, Griffith University, Southport, QLD, Australia)
Article 2
Child Security in Cyberspace Through Moral Cognition (pages 16-29)
Satya Prakash (Indian Institute of Information Technology, Allahabad, Uttar Pradesh, India), Abhishek Vaish (Indian Institute of Information Technology, Allahabad, Uttar Pradesh, India), Natalie Coul (School of Computing & Engineering Systems, University of Abertay Dundee, Dundee, UK), SaravanaKumar G (Indian Institute of Information Technology, Allahabad, Uttar Pradesh, India), T.N. Srinidhi (Indian Institute of Information Technology, Allahabad, Uttar Pradesh, India), Jayaprasad Botsa (Indian Institute of Information Technology, Allahabad, Uttar Pradesh, India)
Article 3
Contributing Factors of Information Security Investments in South East Asia SMBs: A Technology- Organisational -Environment Approach (pages 30-44)
Mathews Z. Nkhoma (Department of Business IT & Logistics, RMIT University Vietnam, Ho Chi Minh City, Vietnam), Duy P. T. Dang (Department of Business IT & Logistics, RMIT University Vietnam, Ho Chi Minh City, Vietnam)
Article 4
Business Driven User Role Assignment: Nimble Adaptation of RBAC to Organizational Changes (pages 45-62)
Ousmane Amadou Dia (Department of Computer Science and Engineering, University of South Carolina, Columbia, SC, USA), Csilla Farkas (Department of Computer Science and Engineering, University of South Carolina, Columbia, SC, USA)
Article 5
Computational Complexity Analysis for a Class of Symmetric Cryptosystems Using Simple Arithmetic Operations and Memory Access Time (pages 63-75)
Walid Y. Zibideh (Qualcomm, San Diego, CA, USA), Mustafa M. Matalgah (Department of Electrical Engineering, University of Mississippi, University, MS, USA)
Issue 2
Article 1
Development of A Formal Security Model for Electronic Voting Systems (pages 1-28)
Katharina Bräunlich (Department of Information Systems Research, University of Koblenz-Landau, Koblenz, Germany), Rüdiger Grimm (Department of Information Systems Research, University of Koblenz-Landau, Koblenz, Germany)
Article 2
Malware Detection and Prevention System Based on Multi-Stage Rules (pages 29-43)
Ammar Alazab (School of Information Technology, Deakin University, Burwood, VIC, Australia), Michael Hobbs (School of Information Technology, Deakin University, Burwood, VIC, Australia), Jemal Abawajy (School of Information Technology, Deakin University, Burwood, VIC, Australia), Ansam Khraisat (Ballarat University, Mt Helen, VIC, Australia)
Article 3
Robust Image Data Hiding Technique for Copyright Protection (pages 44-56)
Siddharth Singh (Department of Electronics & Communication, University of Allahabad, Allahabad, Uttar Pradesh, India), Tanveer J. Siddiqui (Department of Electronics & Communication, University of Allahabad, Allahabad, Uttar Pradesh, India)
Article 4
Formal Verification of Secrecy, Coercion Resistance and Verifiability Properties for a Remote Electronic Voting Protocol (pages 57-85)
Khaoula Marzouki (LIP2-LR99ES18, Faculty of Science of Tunis, Tunis-El Manar University, Tunis, Tunisia), Amira Radhouani (LIP2-LR99ES18, Faculty of Science of Tunis, Tunis-El Manar University, Tunis, Tunisia), Narjes Ben Rajeb (INSAT, LIP2-LR99ES18, Carthage University, Tunis, Tunisia)
Law, Policy and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization
Book Review
Ken Krechmer (University of Colorado, Boulder, CO, USA)
Issue 3
Article 1
A More Secure Image Hiding Scheme Using Pixel Adjustment and Genetic Algorithm (pages 1-15)
Omar Banimelhem (Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan), Lo’ai Tawalbeh (Department of Computer Engineering, Jordan University of Science and Technology, Irbid, Jordan), Moad Mowafi (Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan), Mohammed Al-Batati (Department of Computer Engineering, Jordan University of Science and Technology, Irbid, Jordan)
Article 2
Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA (pages 16-35)
Daniela Simić-Draws (Institut für Wirtschafts- und Verwaltungsinformatik, Universität Koblenz-Landau, Koblenz, Germany), Stephan Neumann (Center for Advanced Security Research Darmstadt, Technische Universität Darmstadt, Darmstadt, Germany), Anna Kahlert (Projektgruppe verfassungsverträgliche Technikgestaltung (Provet), Universität Kassel, Kassel, Germany, Kassel, Germany), Philipp Richter (Projektgruppe verfassungsverträgliche Technikgestaltung (Provet), Universität Kassel, Kassel, Germany, Kassel, Germany), Rüdiger Grimm (Institut für Wirtschafts- und Verwaltungsinformatik, Universität Koblenz-Landau, Koblenz, Germany), Melanie Volkamer (Center for Advanced Security Research Darmstadt, Technische Universität Darmstadt, Darmstadt, Germany), Alexander Roßnagel (Projektgruppe verfassungsverträgliche Technikgestaltung (Provet), Universität Kassel, Kassel, Germany, Kassel, Germany)
Article 3
A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain (pages 36-52)
Esraa Omran (Gulf University for Science & Technology, Kuwait City, Kuwait), Tyrone Grandison (Proficiency Labs, Ashland, OR, USA), David Nelson (Faculty of Applied Sciences, University of Sunderland, Sunderland, UK), Albert Bokma (Avedas Information Management, Karlsruhe, Germany)
Article 4
dDelega: Trust Management for Web Services (pages 53-67)
Michele Tomaiuolo (Department of Information Engineering, University of Parma, Parma, Italy)
Issue 4
Article 1
Secure Communication: A Proposed Public Key Watermark System (pages 1-10)
Shadi R. Masadeh (Department of Computer Networks , Al-Isra University, Amman, Jordan,), Shadi Aljawarneh (Faculty of Information Technology, Al-Isra University Postoffice Amman, Jordan), Ashraf Odeh (Faculty of Information Technology, Al-Isra University Postoffice Amman, Jordan), Abdullah Alhaj (Faculty of Information Technology, University of Jordan, Aqaba, Jordan)
Article 2
Implementation of Improved Hash and Mapping Modified Low Power Parallel Bloom Filter Design (pages 11-21)
K. Saravanan (Department of Electronics and Communication, Nehru Institute of Technology, Coimbatore, Tamil Nadu, India), A. Senthilkumar (Department of Electrical and Electronics, Dr. Mahalingam College of Engineering and Technology, Pollachi, Tamil Nadu, India)
Article 3
A Survey of Security Standards Applicable to Health Information Systems (pages 22-36)
Francis Akowuah (Department of Computer Science, North Carolina A&T State University, Greensboro, NC, USA), Xiaohong Yuan (Department of Computer Science, Center for Cyber Defense (a CAE/IAE), North Carolina A&T State University, Greensboro, NC, USA), Jinsheng Xu (Department of Computer Science, North Carolina A&T State University, Greensboro, NC, USA), Hong Wang (Department of Management, North Carolina A&T State University, Greensboro, NC, USA)
Article 4
An Intelligent Network Intrusion Detection System Based on Multi-Modal Support Vector Machines (pages 37-52)
Srinivasa K G (Department of Computer Science and Engineering, M. S. Ramaiah Institute of Technology, Bangalore, Karnataka, India)
Article 5
False Alarm Reduction Using Adaptive Agent-Based Profiling (pages 53-74)
Salima Hacini (Lire Laboratory, TLSI Department, Constantine2 University, Constantine, Algeria), Zahia Guessoum (LIP6, Pierre et Marie Curie University, Paris, France), Mohamed Cheikh (Lire Laboratory, TLSI Department, Constantine2 University, Constantine, Algeria)
Volume 6 (2012)
Issue 1
Article 1
Global Analysis of Security and Trust Perceptions in Web Design for E-Commerce (pages 1-13)
S. Srinivasan (Texas A&M International University, USA), Robert Barker (University of Louisville, USA)
Article 2
Designing a Secure Cloud Architecture: The SeCA Model (pages 14-32)
Thijs Baars (Utrecht University, The Netherlands), Marco Spruit (Utrecht University, The Netherlands)
Article 3
Performance and Scalability Assessment for Non-Certificate-Based Public Key Management in VANETs (pages 33-56)
Pei-Yuan Shen (Queensland University of Technology, Australia), Maolin Tang (Queensland University of Technology, Australia), Vicky Liu (Queensland University of Technology, Australia), William Caelli (Queensland University of Technology, Australia)
Article 4
Towards Usable Application-Oriented Access Controls: Qualitative Results from a Usability Study of SELinux, AppArmor and FBAC-LSM (pages 57-76)
Z. Cliffe Schreuders (Leeds Metropolitan University, UK), Tanya McGill (Murdoch University, Australia), Christian Payne (Murdoch University, Australia)
Issue 2
Article 1
Safety Measures for Social Computing in Wiki Learning Environment (pages 1-15)
Ahmed Patel (Universiti Kebangsaan Malaysia, Malaysia, and Kingston University, UK), Mona Taghavi (Universiti Kebangsaan Malaysia, Malaysia), Joaquim Celestino Júnior (State University of Ceará, Brazil), Rodziah Latih (Universiti Kebangsaan Malaysia, Malaysia), Abdullah Mohd Zin (Universiti Kebangsaan Malaysia, Malaysia)
Article 2
Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification (pages 16-33)
Dongjin Kim (University of Maryland Baltimore County, USA), Zhiyuan Chen (University of Maryland Baltimore County, USA), Aryya Gangopadhyay (University of Maryland Baltimore County, USA)
Article 3
Securing Fingerprint Images Through PSO Based Robust Facial Watermarking (pages 34-52)
Roli Bansal (University of Delhi, India), Priti Sehgal (University of Delhi, India), Punam Bedi (University of Delhi, India)
Article 4
ECFS: An Enterprise-Class Cryptographic File System for Linux (pages 53-63)
U. S. Rawat (Jaypee University of Engineering & Technology, India), Shishir Kumar (Jaypee University of Engineering & Technology, India)
Article 5
Secure and Optimized Mobile Based Merchant Payment Protocol using Signcryption (pages 64-94)
Shaik Shakeel Ahamad (Institute for Development and Research in Banking Technology and University of Hyderabad, India), V. N. Sastry (Institute for Development and Research in Banking Technology and University of Hyderabad, India), Siba K. Udgata (Institute for Development and Research in Banking Technology and University of Hyderabad, India)
Issue 3
Article 1
A Comparative Survey on Cryptology-Based Methodologies (pages 1-37)
Allan Rwabutaza (ATR Center, Wright State University, USA), Ming Yang (Southern Polytechnic State University, USA), Nikolaos Bourbakis (ATR Center, Wright State University, USA)
Article 2
Article 3
Critical Evaluation of RFID Security Protocols (pages 56-74)
Azam Zavvari (Universiti Kebangsaan Malaysia, Malaysia), Ahmed Patel (Universiti Kebangsaan Malaysia, Malaysia, & Kingston University, UK)
Article 4
Investing in IT Security: How to Determine the Maximum Threshold (pages 75-87)
Amanda Eisenga (Lutgert College of Business, Florida Gulf Coast University, USA), Travis L. Jones (Lutgert College of Business, Florida Gulf Coast University, USA), Walter Rodriguez (Lutgert College of Business, Florida Gulf Coast University, USA)
Article 5
A Practical Approach of Fairness in E-Procurement (pages 88-110)
Debajyoti Konar (Presidency University, India), Chandan Mazumdar (Jadavpur University, India)
Issue 4
Article 1
A Full Review of Attacks and Countermeasures in Wireless Sensor Networks (pages 1-39)
Pejman Niksaz (Department of Computer Engineering, Islamic Azad University, Science and Research Branch, Yazd, Iran), Mohammad Javad Kargar (Department of Computer Engineering, Islamic Azad University, Maybod Branch, Maybod, Iran)
Article 2
A Survey of U.S. Laws for Health Information Security & Privacy (pages 40-54)
Francis Akowuah (Department of Computer Science, North Carolina A&T State University, Greensboro, NC, USA), Xiaohong Yuan (Department of Computer Science, North Carolina A&T State University, Greensboro, NC, USA), Jinsheng Xu (Department of Computer Science, North Carolina A&T State University, Greensboro, NC, USA), Hong Wang (Department of Management, North Carolina A&T State University, Greensboro, NC, USA)
Article 3
Secure Data Hiding Using Eight Queens Solutions (pages 55-70)
Sunil Kumar Muttoo (Department of Computer Science, University of Delhi, New Delhi, India), Vinay Kumar (Department of IT, Vivekanand Institute of Professional Studies, New Delhi, India), Abhishek Bansal (Department of Computer Science, Indira Gandhi National Tribal University, Amarkantak, India)
Article 4
Secure Information Delivery through High Bitrate Data Embedding within Digital Video and its Application to Audio/Video Synchronization (pages 71-93)
Ming Yang (Department of Information Technology, Center for Biometric Research, Southern Polytechnic State University, GA, USA), Chih-Cheng Hung (Anyang Normal University, Anyang, China & Department of Computer Science and Software Engineering, Center for Biometric Research, Southern Polytechnic State University, GA, USA), Edward Jung (Department of Computer Science and Software Engineering, Center for Biometric Research, Southern Polytechnic State University, GA, USA)
Article 5
CITS: The Cost of IT Security Framework (pages 94-116)
Marco Spruit (Department of Information and Computing Sciences, Utrecht University, Utrecht, The Netherlands), Wouter de Bruijn (Department of Information and Computing Sciences, Utrecht University, Utrecht, The Netherlands)
Volume 5 (2011)
Issue 1
Article 1
A Secure Hybrid Network Solution to Enhance the Resilience of the UK Government National Critical Infrastructure TETRA Deployment (pages 1-13)
Devon Bennett (University of East London, UK), Hamid Jahankhani (University of East London, UK), Mohammad Dastbaz (University of East London, UK), Hossein Jahankhani (University of East London, UK)
Article 2
A Self-Supervised Approach to Comment Spam Detection Based on Content Analysis (pages 14-32)
A. Bhattarai (University of Memphis, USA), D. Dasgupta (University of Memphis, USA)
Article 3
A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications (pages 33-49)
Ioana Lasc (University of Limerick, Ireland), Reiner Dojen (University of Limerick, Ireland), Tom Coffey (University of Limerick, Ireland)
Article 4
Information Privacy: Implementation and Perception of Laws and Corporate Policies by CEOs and Managers (pages 50-66)
Garry L. White (Texas State University – San Marcos, USA), Francis A. Méndez Mediavilla (Texas State University – San Marcos, USA), Jaymeen R. Shah (Texas State University – San Marcos, USA)
Issue 2
Article 1
User Perceptions of Security Technologies (pages 1-12)
Douglas M. Kline (University of North Carolina Wilmington, USA), Ling He (Saginaw Valley State University, USA), Ulku Yaylacicegi (University of North Carolina Wilmington, USA)
Article 2
Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree (pages 13-32)
Golam Kaosar (Victoria University, Australia), Xun Yi (Victoria University, Australia)
Article 3
A Mark-Up Language for the Specification of Information Security Governance Requirements (pages 33-53)
Anirban Sengupta (Jadavpur University, India), Chandan Mazumdar (Jadavpur University, India)
Article 4
On the Security of Self-Certified Public Keys (pages 54-60)
Cheng-Chi Lee (Fu Jen Catholic University, Taiwan), Min-Shiang Hwang (Asia University, Taiwan), I-En Liao (National Chung Hsing University, Taiwan)
Issue 3
Article 1
Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card (pages 1-18)
Ahmed Patel (Universiti Kebangsaan Malaysia, Malaysia and Kingston University, UK), Kenan Kalajdzic (Center for Computing Education, Bosnia and Herzegovina), Laleh Golafshan (Department of Computer Engineering and IT, Science and Research Branch, Islamic Azad University, Fars, Iran), Mona Taghavi (Department of Computer, Science and Research Branch, Islamic Azad University, Tehran, Iran)
Article 2
E-Voting Risk Assessment: A Threat Tree for Direct Recording Electronic Systems (pages 19-35)
Harold Pardue (University of South Alabama, USA), Jeffrey P. Landry (University of South Alabama, USA), Alec Yasinsac (University of South Alabama, USA)
Article 3
Intrusion Detection Algorithm for MANET (pages 36-49)
S. Srinivasan (Texas A&M International University, USA), S. P. Alampalayam (APS Technologies, USA)
Article 4
An Integrated Security Governance Framework for Effective PCI DSS Implementation (pages 50-67)
Mathew Nicho (University of Dubai, UAE), Hussein Fakhry (University of Dubai, UAE), Charles Haiber (Kent State University at Stark, USA)
Issue 4
Article 1
A Privacy Agreement Negotiation Model in B2C E-Commerce Transactions (pages 1-7)
Murthy V. Rallapalli (IBM and Stevens Institute of Technology, USA)
Article 2
A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements (pages 8-30)
O. T. Arogundade (Chinese Academy of Sciences, China), A. T. Akinwale (University of Agriculture, Abeokuta, Nigeria), Z. Jin (Peking University, China), X. G. Yang (Chinese Academy of Sciences, China)
Article 3
Evaluating the Quality and Usefulness of Data Breach Information Systems (pages 31-46)
Benjamin Ngugi (Suffolk University, USA), Jafar Mana (Suffolk University, USA), Lydia Segal (Suffolk University, USA)
Article 4
Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework (pages 47-58)
Hassen Sallay (Imam Muhamad Ibn Saud Islamic University, Saudi Arabia), Mohsen Rouached (Imam Muhamad Ibn Saud Islamic University, Saudi Arabia), Adel Ammar (Imam Muhamad Ibn Saud Islamic University, Saudi Arabia), Ouissem Ben Fredj (Imam Muhamad Ibn Saud Islamic University, Saudi Arabia), Khalid Al-Shalfan (Imam Muhamad Ibn Saud Islamic University, Saudi Arabia), Majdi Ben Saad (Imam Muhamad Ibn Saud Islamic University, Saudi Arabia)
Volume 4 (2010)
Issue 1
Article 1
Provable Security for Outsourcing Database Operations (pages 1-17)
Sergei Evdokimov (Humboldt-Universität zu Berlin, Germany), Matthias Fischmann (Humboldt-Universität zu Berlin, Germany), Oliver Günther (Humboldt-Universität zu Berlin, Germany)
Article 2
A Host-Based Intrusion Detection System Using Architectural Features to Improve Sophisticated Denial-of-Service Attack Detections (pages 18-31)
Ran Tao (Louisiana State University, USA), Li Yang (University of Tennessee at Chattanooga, USA), Lu Peng (Louisiana State University, USA), Bin Li (Louisiana State University, USA)
Article 3
A Keystroke Biometric Systemfor Long-Text Input (pages 32-60)
Charles C. Tappert (Pace University, USA), Sung-Hyuk Cha (Pace University, USA), Mary Villani (Pace University, USA), Robert S. Zack (Pace University, USA)
Article 4
A Six-View Perspective Framework for System Security: Issues, Risks, and Requirements (pages 61-92)
Surya B. Yadav (Texas Tech University, USA)
Article 5
Are Online Privacy Policies Readable? (pages 93-116)
M. Sumeeth (University of Alberta, Canada), R. I. Singh (University of Alberta, Canada), J. Miller (University of Alberta, Canada)
Issue 2
Article 1
Protecting User Privacy Better with Query l-Diversity (pages 1-18)
Fuyu Liu (University of Central Florida, USA), Kien A. Hua (University of Central Florida, USA)
Article 2
Globalization and Data Privacy: An Exploratory Study (pages 19-35)
Robert L. Totterdale (Robert Morris University, USA)
Article 3
Security Issues for Cloud Computing (pages 36-48)
Kevin Hamlen (The University of Texas at Dallas, USA), Murat Kantarcioglu (The University of Texas at Dallas, USA), Latifur Khan (The University of Texas at Dallas, USA), Bhavani Thuraisingham (The University of Texas at Dallas, USA)
Article 4
Global Information Security Factors (pages 49-60)
Garry White (Texas State University - San Marcos, USA), Ju Long (Texas State University - San Marcos, USA)
Issue 3
Article 1
The Integrated Privacy Model: Building a Privacy Model in the Business Processes of the Enterprise (pages 1-21)
Munir Majdalawieh (American University of Sharjah, United Arab Emirates)
Article 2
Policy Enforcement System for Inter-Organizational Data Sharing (pages 22-39)
Mamoun Awad (UAE University, UAE), Latifur Khan (The University of Texas at Dallas, USA), Bhavani Thuraisingham (The University of Texas at Dallas, USA)
Article 3
Goals and Practices in Maintaining Information Systems Security (pages 40-50)
Zippy Erlich (The Open University of Israel, Israel), Moshe Zviran (Tel-Aviv University, Israel)
Article 4
Factors Influencing College Students’ Use of Computer Security (pages 51-60)
Norman Pendegraft (University of Idaho, USA), Mark Rounds (University of Idaho, USA), Robert W. Stone (University of Idaho, USA)
Issue 4
Article 1
A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments (pages 1-20)
Feng W. Zhu (The University of Alabama in Huntsville, USA), Sandra Carpenter (The University of Alabama in Huntsville, USA), Wei Zhu (Intergraph Co., USA), Matt Mutka (Michigan State University, USA)
Article 2
Hiding Message in Map Along Pre-Hamiltonian Path (pages 21-34)
Sunil Kumar Muttoo (University of Delhi, India), Vinay Kumar (National Informatics Centre, India)
Article 3
Probabilistic Inference Channel Detection and Restriction Applied to Patients’ Privacy Assurance (pages 35-59)
Bandar Alhaqbani (Queensland University of Technology, Australia), Colin Fidge (Queensland University of Technology, Australia)
Volume 3 (2009)
Issue 1
Article 1
Re-Evaluation of On-Line Hot Topic Discovery Model (pages 1-10)
Hui-min Ye (University of Vermont, USA), Sushil K. Sharma (Ball State University, USA), Huinan Xu (Ernst & Young, USA)
Article 2
Understanding User Behavior towards Passwords through Acceptance and Use Modelling (pages 11-29)
Lee Novakovic (Murdoch University, Australia), Tanya McGill (Murdoch University, Australia), Michael Dixon (Murdoch University, Australia)
Article 3
Without Permission: Privacy on the Line (pages 30-44)
Joanne H. Pratt (Joanne H. Pratt Associates, USA), Sue Conger (University of Dallas, USA)
Article 4
Do Privacy Statements Really Work? The Effect of Privacy Statements and Fair Information Practices on Trust and Perceived Risk in E-Commerce (pages 45-64)
Hamid R. Nemati (The University of North Carolina at Greensboro, USA), Thomas Van Dyke (The University of North Carolina, USA)
Article 5
Large Key Sizes and the Security of Password-Based Cryptography (pages 65-72)
Kent D. Boklan (Queens College, USA)
Issue 2
Article 1
Information Systems Security Assurance Management at Municipal Software Solutions, Inc. (pages 1-9)
Virginia Franke Kleist (West Virginia University, USA), Bonnie Morris (West Virginia University, USA), James W. Denton (West Virginia University, USA)
Article 2
A Chronicle of a Journey: An E-Mail Bounce Back System (pages 10-41)
Alex Kosachev (The University of North Carolina at Greensboro, USA), Hamid R. Nemati (The University of North Carolina at Greensboro, USA)
Article 3
Data Privacy and Security: HIPAA and Small Business Compliance (pages 42-53)
James Suleiman (University of Southern Maine, USA), Terry Huston (IT Consultant, Canada)
Article 4
PCI Compliance: Overcoming the Challenges (pages 54-67)
Benjamin Ngugi (Suffolk University, USA), Gina Vega (Salem State College, USA), Glenn Dardick (Longwood University, USA)
Article 6
Information Security by Words Alone: The Case for Strong Security Policies (pages 84-89)
Kirk P. Arnett (Mississippi State University, USA), Gary F. Templeton (Mississippi State University, USA), David A. Vance (Olivet Nazarene University, USA)
Article 7
The Social Organization of a Criminal Hacker Network: A Case Study (pages 90-104)
Yong Lu (Pennsylvania State University, USA)
Issue 3
Article 1
Security and Privacy Issues in Secure E-Mail Standards and Services (pages 1-13)
Lei Chen (Sam Houston State University, USA), Wen-Chen Hu (University of North Dakota, USA), Ming Yang (Jacksonville State University, USA), Lei Zhang (Frostburg State University, USA)
Article 2
Applied Cryptography for Security and Privacy in Wireless Sensor Networks (pages 14-36)
Dulal C. Kar (Texas A&M University-Corpus Christi, USA), Hung L. Ngo (Texas A&M University-Corpus Christi, USA), Geetha Sanapala (Texas A&M University-Corpus Christi, USA)
Article 3
Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy (pages 37-54)
Ming Yang (Jacksonville State University, USA), Monica Trifas (Jacksonville State University, USA), Guillermo Francia III (Jacksonville State University, USA), Lei Chen (Sam Houston State University, USA)
Article 4
Cloak and Dagger: Man-In-The-Middle and Other Insidious Attacks (pages 55-75)
Ramakrishna Thurimella (University of Denver, USA), William Mitchell (University of Denver, USA)
Article 5
Fair Electronic Exchange Based on Fingerprint Biometrics (pages 76-106)
Harkeerat Bedi (University of Tennessee at Chattanooga, USA), Li Yang (University of Tennessee at Chattanooga, USA)
Article 6
Secure and Private Service Discovery in Pervasive Computing Environments (pages 107-122)
Feng Zhu (University of Alabama in Huntsville, USA), Wei Zhu (Intergraph Co, USA)
Issue 4
Article 1
Preserving Privacy in Mining Quantitative Associations Rules (pages 1-17)
Madhu V. Ahluwalia (University of Maryland Baltimore County, USA), Aryya Gangopadhyay (University of Maryland Baltimore County, USA), Zhiyuan Chen (University of Maryland Baltimore County, USA)
Article 2
A New Soa Security Model to Protect Against Web Competitive Intelligence Attacks by Software Agents (pages 18-28)
Hamidreza Amouzegar (K. N. Toosi University of Technology, Iran), Mohammad Jafar Tarokh (K. N. Toosi University of Technology, Iran), Anahita Naghilouye Hidaji (Infotech Pars Company, Iran)
Article 3
PAKE on the Web (pages 29-42)
Xunhua Wang (James Madison University, USA), Hua Lin (University of Virginia, USA)
Article 4
Three Models to Measure Information Security Compliance (pages 43-67)
Wasim A Al-Hamdani (Kentucky State University, USA)
Article 5
Do You Know Where Your Data Is? A Study of the Effect of Enforcement Strategies on Privacy Policies (pages 68-95)
Ian Reay (University of Alberta, Canada), Patricia Beatty (University of Alberta, Canada), Scott Dick (University of Alberta, Canada), James Miller (University of Alberta, Canada)
Volume 2 (2008)
Issue 1
Article 2
Life Cycle Pattern Study of Malicious Codes (pages 26-41)
June Wei (University of West Florida, USA), Randall C. Reid (University of West Florida, USA), Hongmei Zhang (University of South Carolina, USA)
Article 3
An Empirical Investigation of an Individual's Perceived Need for Privacy and Security (pages 42-53)
Taner Pirim (Mississsippi Center for Supercomputing Research, USA), Tabitha James (Virginia Polytechnic Institute and State University, USA), Katherine Boswell (University of Louisiana at Monroe, USA), Brian Reithel (University of Mississippi, USA), Reza Barkhi (Virginia Polytechnic Institute and State University, USA)
Article 4
VIPSEC: Virtualized and Pluggable Security Services Architecture for Grids (pages 54-79)
Syed Naqvi (Centre of Excellence in Information and Communication Technologies, Belgium)
Article 5
Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Use (pages 80-90)
S.E. Kruck (James Madison University, USA), Faye P. Teer (James Madison University, USA)
Issue 2
Article 1
Memory-Based Antiforensic Tools and Techniques (pages 1-13)
Hamid Jahankhani (University of East London, UK), Elidon Beqiri (University of East London, UK)
Article 2
A Secure and Trustful E-Ordering Architecture (TOES) for Small and Medium Size Enterprises (SEMs) (pages 14-30)
Spyridon Papastergiou (University of Pireaus, Greece), Despina Polemi (University of Pireaus, Greece)
Article 3
Trust-Based Usage Control in Collaborative Environment (pages 31-45)
Li Yang (University of Tennessee at Chattanooga, USA), Chang Phuong (University of Tennessee at Chattanooga, USA), Amy Novobilski (University of Tennessee at Chattanooga, USA), Raimund K. Ege (North Illinois University, USA)
Article 4
Spam Classification Based on E-Mail Path Analysis (pages 46-69)
Srikanth Palla (University of North Texas, USA), Ram Dantu (University of North Texas, USA), João W. Cangussu (University of Texas at Dallas, USA)
Article 5
Laws and Regulations Dealing with Information Security and Privacy: An Investigative Study (pages 70-82)
John A. Cassini (Université d’Angers, France), B.Dawn Medlin (Appalachian State University, USA), Adriana Romaniello (Universidad Rey Juan Carlos, Spain)
Issue 3
Article 1
The Impact of Privacy Legislation on Patient Care (pages 1-17)
Jeff Barnett (University of Victoria, Canada)
Article 2
Using Statistical Texture Analysis for Medical Image Tamper Proofing (pages 18-27)
Samia Boucherkha (Mentouri University, Algeria), Mohamed Benmohamed (Mentouri University, Algeria)
Article 3
A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes (pages 28-44)
Tamas S. Gal (Univeristy of Maryland Baltimore County (UMBC), USA), Zhiyuan Chen (Univeristy of Maryland Baltimore County (UMBC), USA), Aryya Gangopadhyay (Univeristy of Maryland Baltimore County (UMBC), USA)
Article 4
Electronic Medical Records, HIPAA, and Patient Privacy (pages 45-54)
Jingquan Li (Texas A&M University-Kingsville, USA), Michael J. Shaw (University of Illinois at Urbana-Champaign, USA)
Article 5
Protecting Patient Information in Outsourced Telehealth Services: Bolting on Security when it cannot be Baked in (pages 55-70)
Patricia Y. Logan (Marshall University Graduate College, USA), Debra Noles (Marshall University Graduate College, USA)
Article 6
Analyzing the Vulnerability of U.S. Hospitals to Social Engineering Attacks: How Many of Your Employees Would Share Their Password? (pages 71-83)
B. Dawn Medlin (Appalachian State University, USA), Joseph A. Cazier (Appalachian State University, USA), Daniel P. Foulk (Appalachian State University, USA)
Article 7
The Influence of Media Trust and Internet Trust on Privacy-Risking Uses of E-Health (pages 84-97)
E. Vance Wilson (University of Toledo, USA), David D. Dobrzykowski (University of Toledo, USA), Joseph A. Cazier (Appalachian State University, USA)
Issue 4
Article 1
On Access-Unrestricted Data Anonymity and Privacy Inference Disclosure Control (pages 1-21)
Zude Li (University of Western Ontario, Canada), Xiaojun Ye (Tsinghua University, China)
Article 2
A Decentralized Security Framework for Web-Based Social Networks (pages 22-53)
Barbara Carminati (Universita degli Studi dell’Insubria, Italy), Elena Ferrari (Universita degli Studi dell’Insubria, Italy), Andrea Perego (Universita degli Studi dell’Insubria, Italy)
Article 3
SecCMP: Enhancing Critical Secrets Protection in Chip-Multiprocessors (pages 54-66)
Li Yang (University of Tennessee at Chattanooga, USA), Lu Peng (Louisiana State University, USA), Balachandran Ramadass (Louisiana State University, USA)
Article 4
Design and Implementation of a Framework for Assured Information Sharing Across Organizational Boundaries (pages 67-90)
Bhavani Thuraisingham (The University of Texas at Dallas, USA), Yashaswini Harsha Kumar (The University of Texas at Dallas, USA), Latifur Khan (The University of Texas at Dallas, USA)
Article 5
Will it be Disclosure or Fabrication of Personal Information? An Examination of Persuasion Strategies on Prospective Employees (pages 91-109)
Xun Li (University of Kentucky, USA), Radhika Santhanam (University of Kentucky, USA)
Volume 1 (2007)
Issue 1
Article 1
Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation (pages 1-17)
Stephen J.H. Yang (National Central University, Taiwan), Blue C.W. Lan (National Central University, Taiwan), James S.F. Hsieh (Ulead Systems Inc., Taiwan), Jen-Yao Chung (IBM T. J. Watson Research Center, USA)
Article 2
Administering the Semantic Web: Confidentiality, Privacy, and Trust Management (pages 18-34)
Bhavani Thuraisingham (The University of Texas at Dallas, USA), Natasha Tsybulnik (The University of Texas at Dallas, USA), Ashraful Alam (The University of Texas at Dallas, USA)
Article 3
Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication (pages 35-46)
Song Han (Curtin University of Technology, Australia), Vidyasagar Potdar (Curtin University of Technology, Australia), Elizabeth Chang (Curtin University of Technology, Australia), Tharam Dillon (University of Technology, Australia)
Article 4
Privacy-Preserving Data Mining and the Need for Confluence of Research and Practice (pages 47-63)
Lixin Fu (The University of North Carolina at Greensboro, USA), Hamid Nemati (The University of North Carolina at Greensboro, USA), Fereidoon Sadri (The University of North Carolina at Greensboro, USA)
Article 5
Privacy and Security in the Age of Electronic Customer Relationship Management (pages 65-86)
Nicholas C. Romano Jr. (Oklahoma State University, USA), Jerry Fjermestad (New Jersey Institute of Technology, USA)
Issue 2
Article 1
On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text (pages 1-12)
Dieter Bartmann (Universität Regensburg, Germany), Idir Bakdi (Universität Regensburg, Germany), Michael Achatz (Universität Regensburg, Germany)
Article 2
Privacy-Preserving Clustering to Uphold Business Collaboration: A Dimensionality Reduction Based Transformation Approach (pages 13-36)
Stanley R.M. Oliveira (Embrapa Informática Agropecuária, Brazil), Osmar R. Zaïane (University of Alberta, Canada)
Article 3
Information Security Effectiveness: Conceptualization and Validation of a Theory (pages 37-60)
Kenneth J. Knapp (US Air Force Academy, USA), Thomas E. Marshall (Auburn University, USA), R. Kelly Rainer Jr. (Auburn University, USA), F. Nelson Ford (Auburn University, USA)
Article 4
The Role of Privacy Risk in IT Acceptance: An Empirical Study (pages 61-73)
Joseph A. Cazier (Appalachian State University, USA), E. Vance Wilson (University of Wisconsin-Milwaukee, USA), B. Dawn Medlin (Appalachian State University, USA)
Article 5
Issue 3
Article 1
A Projection of the Future Effects of Quantum Computation on Information Privacy (pages 1-12)
Geoff Skinner (Centre for Extended Enterprise and Business Intelligence Curtin University of Technology, Australia), Elizabeth Chang (Centre for Extended Enterprise and Business Intelligence Curtin University of Technology, Australia)
Article 2
Information Systems Security: Cases of Network Administrator Threats (pages 13-25)
Hamid Jahankhani (University of East London, UK), Shantha Fernando (University of Moratuwa, Sri Lanka), Mathews Z. Nkhoma (University of East London, UK), Haralambos Mouratidis (University of East London, UK)
Article 3
A Rule-Based and Game-Theoretic Approach to Online Credit Card Fraud Detection (pages 26-46)
Vishal Vatsa (Indian Institute of Technology, India), Shamik Sural (Indian Institute of Technology, India), A. K. Majumdar (Indian Institute of Technology, India)
Article 4
Defeating Active Phishing Attacks for Web-Based Transactions (pages 47-60)
Xin Luo (Virginia State University, USA), Tan Teik Guan (Data Security Systems Solutions Pte Ltd, Singapore)
Article 5
A Semi-fragile Image Watermarking using Wavelet Inter Coefficient Relations (pages 61-75)
Latha Parameswaran (AMRITA University, India), K. Anbumani (Karunya University, India)
Issue 4
Article 1
An Ontology of Information Security (pages 1-23)
Almut Herzog (Linkopings Universitet, Sweden), Nahid Shahmehri (Linkopings Universitet, Sweden), Claudiu Duma (Linkopings Universitet, Sweden)
Article 2
Towards Autonomous User Privacy Control (pages 24-46)
Amr Ali Eldin (Delft University of Technology, The Netherlands), Rene Wagenaar (Delft University of Technology, The Netherlands)
Article 3
E-Mail Worm Detection Using Data Mining (pages 47-61)
Mohammad M. Masud (The University of Texas at Dallas, USA), Latifur Khan (The University of Texas at Dallas, USA), Bhavani Thuraisingham (The University of Texas at Dallas, USA)
Article 4
A Simulation Model of Information Systems Security (pages 62-74)
Norman Pendegraft (University of Idaho, USA), Mark Rounds (University of Idaho, USA)
Article 5
Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions (pages 75-86)
Kirk P. Arnett (Mississippi State University, USA), Mark B. Schmidt (St. Cloud State University, USA), Allen C. Johnston (University of Alabama Birmingham, USA), Jongki Kim (Pusan National University, Republic of Korea), Hajin Hwang (Catholic University of Daegu, Republic of Korea)