Journal: Computers & Security

Volume 28, Issue 1-2

1 -- 0Stephen D. Wolthusen. Editorial
2 -- 7Sergei A. Obiedkov, Derrick G. Kourie, Jan H. P. Eloff. Building access control models with attribute exploration
8 -- 17Travis D. Breaux, Annie I. Antón, Eugene H. Spafford. A distributed requirements management framework for legal compliance and accountability
18 -- 28Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo, Gabriel Maciá-Fernández, E. Vázquez. Anomaly-based network intrusion detection: Techniques, systems and challenges
29 -- 39Xiaozhuo Gu, Jianzu Yang, Julong Lan, Zhenhuan Cao. Huffman-based join-exit-tree scheme for contributory key management
40 -- 46Javad Akbari Torkestani, Mohammad Reza Meybodi. RAID-RMS: A fault tolerant stripped mirroring RAID architecture for distributed systems
47 -- 62Catherine S. Weir, Gary Douglas, Martin Carruthers, Mervyn A. Jack. User perceptions of security, convenience and usability for ebanking authentication tokens
63 -- 71Amir Herzberg. Why Johnny can t surf (safely)? Attacks and defenses for web users
72 -- 76Hongxin Zhang, Yuewang Huang, Jianxin Wang, Yinghua Lu, Jinling Zhang. Recognition of electro-magnetic leakage information from computer radiation with SVM
77 -- 84K. Vimal Kumar. Securing communication using function extraction technology for malicious code behavior analysis
85 -- 93Seongseob Hwang, Sungzoon Cho, Sunghoon Park. Keystroke dynamics-based authentication for mobile devices
94 -- 99Jasim A. Ghaeb, J. Chebil. An oblique-matrix technique for data integrity assurance
100 -- 104Song Lin, Biao Wang, Zhoujun Li. Digital multisignature on the generalized conic curve over Z::n::