Journal: Computers & Security

Volume 29, Issue 8

813 -- 814Eugene H. Spafford. Security, technology, publishing, and ethics (Part I)
815 -- 830Jinpeng Wei, Calton Pu. Modeling and preventing TOCTTOU vulnerabilities in Unix-style file systems
831 -- 839Michael Workman. A behaviorist perspective on corporate harassment online: Validation of a theoretical model of psychological motives
840 -- 847E. Kritzinger, Sebastiaan H. von Solms. Cyber security for home users: A new way of protection through awareness enforcement
848 -- 858Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati. Access control for smarter healthcare using policy spaces
859 -- 874Ioanna Kantzavelou, Sokratis K. Katsikas. A game-based intrusion detection mechanism to confront internal attackers
875 -- 890Javier Herranz, Stan Matwin, Jordi Nin, Vicenç Torra. Classifying data from protected statistical datasets
891 -- 902Fred Cohen. A method for forensic analysis of control

Volume 29, Issue 7

729 -- 730Eugene H. Spafford. Editorial
731 -- 736Anthonie B. Ruighaver, Sean B. Maynard, M. Warren. Ethical decision making: Improving the quality of acceptable use policies
737 -- 755Francesco Palmieri, Ugo Fiore. Network anomaly detection through nonlinear analysis
756 -- 769Nitesh B. Guinde, Sotirios G. Ziavras. Efficient hardware support for pattern matching in network intrusion detection
770 -- 784Jaime A. Pavlich-Mariscal, Steven A. Demurjian, Laurent D. Michel. A framework for security assurance of access control enforcement code
785 -- 806Anthony J. Palmer. Approach for selecting the most suitable Automated Personal Identification Mechanism (ASMSA)

Volume 29, Issue 6

641 -- 642Eugene H. Spafford. Editorial
643 -- 658Marianthi Theoharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis. A multi-layer Criticality Assessment methodology based on interdependencies
659 -- 679Teodor Sommestad, Mathias Ekstedt, Pontus Johnson. A probabilistic relational model for security risk analysis
680 -- 685Theodoros Kavallaris, Vasilios Katos. On the detection of pod slurping attacks
686 -- 696Xiaochao Zi, Lihong Yao, Li Pan, Jianhua Li. Implementing a passive network covert timing channel
697 -- 711M. Francisca Hinarejos, Jose L. Muñoz, Jordi Forné, Oscar Esparza. PREON: An efficient cascade revocation mechanism for delegation paths
712 -- 723Gina C. Tjhai, Steven Furnell, Maria Papadaki, Nathan L. Clarke. A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm

Volume 29, Issue 5

521 -- 522Dimitris Gritzalis, Javier Lopez. Editorial
523 -- 532Herbert Leitold, Reinhard Posch, Thomas Rössler. Reconstruction of electronic signatures from eDocument printouts
533 -- 547Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, Pierangela Samarati. Managing key hierarchies for access control enforcement: Heuristic approaches
548 -- 564Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde. Taming role mining complexity in RBAC
565 -- 579Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson. On a taxonomy of delegation
580 -- 591Jan Kolter, Thomas Kernchen, Günther Pernul. Collaborative privacy management
592 -- 602Ryan Farley, Xinyuan Wang. Roving bugnet: Distributed surveillance threat and mitigation
603 -- 618Yannis Soupionis, Dimitris Gritzalis. Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony
619 -- 627Alessandro Sorniotti, Refik Molva. A provably secure secret handshake with dynamic controlled matching
628 -- 635Marcel Fernandez, Josep Cotrina, Miguel Soriano, Neus Domingo. A note about the identifier parent property in Reed-Solomon codes

Volume 29, Issue 4

381 -- 382Dimitris Gritzalis, Pierangela Samarati. Editorial
383 -- 392Egon Hilgenstieler, Elias Procópio Duarte Jr., Glenn Mansfield Keeni, Norio Shiratori. Extensions to the source path isolation engine for precise and efficient log-based IP traceback
393 -- 409A. Maciej Rossudowski, Hein S. Venter, Jan H. P. Eloff, Derrick G. Kourie. A security privacy aware architecture and protocol for a single smart card used for multiple services
410 -- 418Fangwei Wang, Yunkai Zhang, Changguang Wang, Jianfeng Ma, Sang-Jae Moon. Stability analysis of a SEIQV epidemic model for rapid spreading worms
419 -- 431Tony Cheneau, Aymen Boudguiga, Maryline Laurent. Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU
432 -- 445Eirik Albrechtsen, Jan Hovden. Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study
446 -- 459Ji Won Yoon, Hyoungshick Kim, Jun Ho Huh. Hybrid spam filtering for mobile communication
460 -- 475Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis. A generic mechanism for efficient authentication in B3G networks
476 -- 486Johan Van Niekerk, Rossouw von Solms. Information security culture: A management perspective
487 -- 500Todd Mander, Richard Cheung, Farhad Nabhani. Power system DNP3 data object security using data sets
501 -- 514Jordi Forné, M. Francisca Hinarejos, Andrés Marín, Florina Almenárez Mendoza, Javier Lopez, José A. Montenegro, Marc Lacoste, Daniel Diaz. Pervasive authentication and authorization infrastructures for mobile users

Volume 29, Issue 3

299 -- 301Seok-Won Lee, Mattia Monga. Special issue on software engineering for secure systems
302 -- 314Alfredo Pironti, Riccardo Sisto. Provably correct Java implementations of Spi Calculus security protocols specifications
315 -- 330Andreas Bauer 0002, Jan Jürjens. Runtime verification of cryptographic protocols
331 -- 349Liang Xiao 0002, Bo Hu, Madalina Croitoru, Paul H. Lewis, Srinandan Dasmahapatra. A knowledgeable security model for distributed health information systems
350 -- 379Jaime A. Pavlich-Mariscal, Steven A. Demurjian, Laurent D. Michel. A framework of composable access control features: Preserving separation of access control concerns from models to code

Volume 29, Issue 2

165 -- 166Dimitris Gritzalis, Sabrina De Capitani di Vimercati. Editorial
167 -- 179Josep Lluis Ferrer-Gomilla, Jose Antonio Onieva, Magdalena Payeras, Javier Lopez. Certified electronic mail: Properties revisited
180 -- 195Houssem Jarraya, Maryline Laurent. A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
196 -- 207A. Da Veiga, Jan H. P. Eloff. A framework and assessment instrument for information security culture
208 -- 224Ming-Yang Su. WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks
225 -- 243Sven Ehlert, Dimitris Geneiatakis, Thomas Magedanz. Survey of network security systems to counter SIP-based denial-of-service attacks
244 -- 252Marko Hölbl, Tatjana Welzer, Bostjan Brumen. Two proposed identity-based three-party authenticated key agreement protocols from pairings
253 -- 268Natalia Stakhanova, Samik Basu, Johnny Wong. On the symbiosis of specification-based and anomaly-based detection
269 -- 277Chin-Chen Chang, Hao-Chuan Tsai, Yi-Pei Hsieh. An efficient and fair buyer-seller fingerprinting scheme for large scale networks
278 -- 290Gabriel López Millán, Manuel Gil Pérez, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta. PKI-based trust management in inter-domain scenarios

Volume 29, Issue 1

1 -- 2Dimitris Gritzalis, Jan H. P. Eloff. Editorial
3 -- 15Fuwen Liu, Hartmut König. A survey of video encryption algorithms
16 -- 34Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis. An intruder model with message inspection for model checking security protocols
35 -- 44Georgios P. Spathoulas, Sokratis K. Katsikas. Reducing false positives in intrusion detection systems
45 -- 58Alexander K. Seewald, Wilfried N. Gansterer. On the detection and identification of botnets
59 -- 73Heechang Shin, Jaideep Vaidya, Vijayalakshmi Atluri. Anonymization models for directional location based service environments
74 -- 87Gabriele Costa, Fabio Martinelli, Paolo Mori, Christian Schaefer, Thomas Walter. Runtime monitoring for next generation Java ME platform
88 -- 103Tyrone S. Toland, Csilla Farkas, Caroline M. Eastman. The inference problem: Maintaining maximal availability in the presence of database updates
104 -- 123Yoon Ho Choi, Lunquan Li, Peng Liu, George Kesidis. Worm virulence estimation for the containment of local worm outbreak
124 -- 140Chenfeng Vincent Zhou, Christopher Leckie, Shanika Karunasekera. A survey of coordinated attacks and collaborative intrusion detection
141 -- 157Carlos Javier Hernandez-Castro, Arturo Ribagorda. Pitfalls in CAPTCHA design and implementation: The Math CAPTCHA, a case study