Journal: Computers & Security

Volume 28, Issue 7

491 -- 492Dimitris Gritzalis, Steven Furnell. Editorial
493 -- 508Kenneth J. Knapp, R. Franklin Morris Jr., Thomas E. Marshall, Terry Anthony Byrd. Information security policy: An organizational-level process model
509 -- 520Sara Kraemer, Pascale Carayon, John Clem. Human and organizational factors in computer and information security: Pathways to vulnerabilities
521 -- 535Howard Chivers, John A. Clark, Pau-Chen Cheng. Risk profiles and distributed risk assessment
536 -- 544Keshnee Padayachee, Jan H. P. Eloff. Adapting usage control as a deterrent to address the inadequacies of access controls
545 -- 556Félix Gómez Mármol, Gregorio Martínez Pérez. Security threats scenarios in trust and reputation models for distributed systems
557 -- 565Hongwei Lu, Bailing Liu. DFANS: A highly efficient strategy for automated trust negotiation
566 -- 577Nicola Dragoni, Fabio Massacci, Thomas Walter, Christian Schaefer. What the heck is this application doing? - A security-by-contract architecture for pervasive services
578 -- 591Dimitris Geneiatakis, Nikos Vrakas, Costas Lambrinoudakis. Utilizing bloom filters for detecting flooding attacks against SIP based services
592 -- 604Engin Kirda, Nenad Jovanovic, Christopher Kruegel, Giovanni Vigna. Client-side cross-site scripting protection
605 -- 614Zonghua Zhang, Pin-Han Ho, Liwen He. Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach
615 -- 627Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis. Confidence in smart token proximity: Relay attacks revisited
628 -- 636Fangwei Wang, Yunkai Zhang, Jianfeng Ma. Defending passive worms in unstructured P2P networks based on healthy file dissemination
637 -- 647Scott E. Coull, Boleslaw K. Szymanski. On the development of an internetwork-centric defense for scanning worms
648 -- 659Suleyman Kondakci. A concise cost analysis of Internet malware
660 -- 669Gedare Bloom, Bhagirath Narahari, Rahul Simha, Joseph Zambreno. Providing secure execution environments with a last line of defense against Trojan circuit attacks
670 -- 682Özdemir Çetin, Ahmet Turan Özcerit. A new steganography algorithm based on color histograms for data embedding into raw video streams
683 -- 697S. Geetha, Siva S. Sivatha Sindhu, N. Kamaraj. Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system
698 -- 709Ibrahim Kamel. A schema for protecting the integrity of databases
710 -- 722Refik Samet. Design and implementation of highly reliable dual-computer systems