Journal: Computers & Security

Volume 23, Issue 7

531 -- 532E. Eugene Schultz. The gap between cryptography and information security: has it narrowed?
533 -- 541E. Eugene Schultz. Security views
542 -- 546Steve Purser. Improving the ROI of the security management process
549 -- 558Ming Li. An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition
559 -- 570Marijke Coetzee, Jan H. P. Eloff. Towards Web Service access control
571 -- 577Tian-Fu Lee, Tzonelih Hwang, Chun-Li Lin. Enhanced three-party encrypted key exchange without server public keys
578 -- 590Javier Lopez, Rolf Oppliger, Günther Pernul. Authentication and authorization infrastructures (AAIs): a comparative survey
591 -- 605Jae-Myeong Jeon, Yon Dohn Chung, Myoung-Ho Kim, Yoon-Joon Lee. Filtering XPath expressions for XML access control
606 -- 614Andrew Teoh Beng Jin, David Ngo Chek Ling, Alwyn Goh. Personalised cryptographic key generation based on FaceHashing
615 -- 619Shin-Jia Hwang, Ching-Chung Chan. Improvement on Li et al. s generalization of proxy signature schemes