Journal: Computers & Security

Volume 23, Issue 8

621 -- 622E. Eugene Schultz. Is the U.S. government really getting serious about information security?
633 -- 637Sebastiaan H. von Solms, Emil Marais. From secure wired networks to secure wireless networks - what are the extra risks?
638 -- 646Shaun Posthumus, Rossouw von Solms. A framework for the governance of information security
649 -- 658Axelle Apvrille, Makan Pourzandi. XML distributed security policy for clusters
659 -- 664Cungang Yang, Celia Li. Access control in a hierarchy using one-way hash functions
665 -- 678Li-Chiou Chen, Thomas A. Longstaff, Kathleen M. Carley. Characterization of defense mechanisms against distributed denial of service attacks
679 -- 686Afzel Noore, Nikhil Tungala, Max M. Houck. Embedding biometric identifiers in 2D barcodes for improved security
687 -- 696Rachid Beghdad. Modelling and solving the intrusion detection problem in computer networks
697 -- 704Yanjiang Yang, Shuhong Wang, Feng Bao, Jie Wang, Robert H. Deng. New efficient user identification and key distribution scheme providing enhanced security
705 -- 713Heba Kamal Aslan. A hybrid scheme for multicast authentication over lossy networks

Volume 23, Issue 7

531 -- 532E. Eugene Schultz. The gap between cryptography and information security: has it narrowed?
533 -- 541E. Eugene Schultz. Security views
542 -- 546Steve Purser. Improving the ROI of the security management process
549 -- 558Ming Li. An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition
559 -- 570Marijke Coetzee, Jan H. P. Eloff. Towards Web Service access control
571 -- 577Tian-Fu Lee, Tzonelih Hwang, Chun-Li Lin. Enhanced three-party encrypted key exchange without server public keys
578 -- 590Javier Lopez, Rolf Oppliger, Günther Pernul. Authentication and authorization infrastructures (AAIs): a comparative survey
591 -- 605Jae-Myeong Jeon, Yon Dohn Chung, Myoung-Ho Kim, Yoon-Joon Lee. Filtering XPath expressions for XML access control
606 -- 614Andrew Teoh Beng Jin, David Ngo Chek Ling, Alwyn Goh. Personalised cryptographic key generation based on FaceHashing
615 -- 619Shin-Jia Hwang, Ching-Chung Chan. Improvement on Li et al. s generalization of proxy signature schemes

Volume 23, Issue 6

441 -- 442E. Eugene Schultz. The case for one-time credentials
453 -- 455Steven A. Hofmeyr. The implications of immunology for secure systems design
459 -- 468Avishai Wool. The use and usability of direction-based filtering in firewalls
469 -- 477Rui Jiang, Li Pan, Jianhua Li. Further analysis of password authentication schemes based on authentication tests
478 -- 488Hassan Artail. Peer-assisted carrying authentication (PACA)
489 -- 497H. S. Venter, Jan H. P. Eloff. Vulnerability forecasting - a conceptual model
498 -- 529Gwan-Hwan Hwang, Tao-Ku Chang. An operational model and language support for securing XML documents

Volume 23, Issue 5

353 -- 354E. Eugene Schultz. Sarbanes-Oxley - a huge boon to information security in the US
355 -- 361E. Eugene Schultz. Security views
362 -- 370Andrew Stewart. On risk: perception and direction
371 -- 376Sebastiaan H. von Solms, Rossouw von Solms. The 10 deadly sins of information security management
379 -- 388Hassan Aljifri, Diego Sánchez Navarro. Search engines and privacy
389 -- 399Tzer-Shyong Chen. An English auction scheme in the online transaction environment
400 -- 412David L. Baumer, Julia Brande Earp, J. C. Poindexter. Internet privacy law: a comparison between the United States and the European Union
413 -- 424Dimitrios Lekkas, Dimitris Gritzalis. Cumulative notarization for long-term preservation of digital signatures
425 -- 427Chou Chen Yang, Ren-Chiun Wang. Cryptanalysis of a user friendly remote authentication scheme with smart cards
428 -- 440Enzhe Yu, Sungzoon Cho. Keystroke dynamics identity verification - its problems and practical solutions

Volume 23, Issue 4

265 -- 266E. Eugene Schultz. Intrusion prevention
267 -- 274E. Eugene Schultz. Security views
275 -- 279Rossouw von Solms, Sebastiaan H. von Solms. From policies to culture
282 -- 289Ji Hu, Christoph Meinel. Tele-Lab IT-Security on CD: portable, reliable and safe IT security training
290 -- 299Heba Kamal Aslan. Logical analysis of AUTHMAC_DH: a new protocol for authentication and key distribution
300 -- 311Victoria Ungureanu. Formal support for certificate management policies
312 -- 319Sanghyun Cho, Sung Deok Cha. SAD: web session anomaly detection based on parameter estimation
320 -- 329Heba Kamal Aslan. A scalable and distributed multicast security protocol using a subgroup-key hierarchy
330 -- 337Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen. The design of a secure anonymous Internet voting system
338 -- 351Yougang Song, Brett D. Fleisch. Rico: a security proxy for mobile code

Volume 23, Issue 3

179 -- 180E. Eugene Schultz. Worms and viruses: are we losing control?
181 -- 190E. Eugene Schultz. Security views
191 -- 198Cheryl Vroom, Rossouw von Solms. Towards information security behavioural compliance
199 -- 212Min-Hui Lin, Chin-Chen Chang, Yan-Ren Chen. A fair and secure mobile agent environment based on blind signature and proxy host
213 -- 228Charles Iheagwara. The effect of intrusion detection management methods on the return on investment
229 -- 240Liehuang Zhu, Yuanda Cao, Dong Wang. Digital signature of multicast streams secure against adaptive chosen message attack
241 -- 252Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Peini Liu. Predicting the intrusion intentions by observing system call sequences
253 -- 264Denis Besnard, Budi Arief. Computer security impaired by legitimate users

Volume 23, Issue 2

87 -- 88E. Eugene Schultz. Incident response teams need to change
97 -- 103Mohammad Peyravian, Allen Roginsky, Nevenko Zunic. Non-PKI methods for public key distribution
107 -- 119Horng-Twu Liaw. A secure electronic voting protocol for general elections
120 -- 125Tzong-Sun Wu, Chien-Lung Hsu. Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks
126 -- 136Chang-Joo Moon, Dae-Ha Park, Soung-Jin Park, Doo-Kwon Baik. Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration
137 -- 153Theodore Stergiou, Mark S. Leeson, Roger J. Green. An alternative architectural framework to the OSI security model
154 -- 166Allister Cournane, Ray Hunt. An analysis of the tools used for the generation and prevention of spam
167 -- 173Wen-Shenq Juang. Efficient password authenticated key agreement using smart cards
174 -- 178Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Yang. An improvement of nonrepudiable threshold proxy signature scheme with known signers

Volume 23, Issue 1

1 -- 2E. Eugene Schultz. Security training and awareness - fitting a square peg in a round hole
12 -- 16Marcus K. Rogers, Kate Seigfried. The future of computer forensics: a needs analysis survey
17 -- 21Stuart King. Applying application security standards - a case study
22 -- 28John Leach. TBSE - an engineering approach to the design of accurate and reliable security systems
31 -- 42Ronald F. DeMara, Adam J. Rocke. Mitigation of network tampering using dynamic dispatch of mobile agents
43 -- 51Soumyo D. Moitra, Suresh L. Konda. An empirical investigation of network attacks on computer systems
52 -- 62Vinícius da Silveira Serafim, Raul Fernando Weber. Restraining and repairing file system damage through file integrity control
63 -- 76Albin Zuccato. Holistic security requirement engineering for electronic commerce
77 -- 84Janusz Szczepanski, Elek Wajnryb, José M. Amigó, Maria V. Sanchez-Vives, Mel Slater. Biometric random number generators
85 -- 0Brian McKenna. Erratum to Attacks on the (enhanced) Yang-Shieh authentication [Comput Secur 22(8) (2003) 725-727]