Journal: IJICS

Volume 2, Issue 4

328 -- 352Ioannis Mavridis, Andreas K. Mattas, Ioannis Pagkalos, Isabella Kotini, Christos Ilioudis. Supporting dynamic administration of RBAC in web-based collaborative applications during run-time
353 -- 375Murat Kantarcioglu, Onur Kardes. Privacy-preserving data mining in the malicious model
376 -- 410Aameek Singh, Ling Liu, Mustaque Ahamad. Privacy analysis and enhancements for data sharing in *nix systems
411 -- 433Yanjun Zuo. Prompt damage identification for system survivability

Volume 2, Issue 3

235 -- 249Pallapa Venkataram, Jeremy Pitt, B. Sathish Babu, Ebrahim Mamdani. An intelligent proactive security system for cyber centres using Cognitive Agents
250 -- 267Turki F. Al-Somani. Overlapped parallel computations of scalar multiplication with resistance against Side Channel Attacks
268 -- 296Amitabh Saxena, Ben Soh. One-Way Signature Chaining: a new paradigm for group cryptosystems
297 -- 324Huaqiang Wei, Jim Alves-Foss, Terence Soule, Hugh Pforsich, Du Zhang, Deborah A. Frincke. A Layered Decision Model for cost-effective system security

Volume 2, Issue 2

107 -- 139Wei Lu, Issa Traoré. Unsupervised anomaly detection using an evolutionary extension of k-means algorithm
140 -- 174Lyes Khelladi, Yacine Challal, Abdelmadjid Bouabdallah, Nadjib Badache. On security issues in embedded systems: challenges and solutions
175 -- 196Daniel O. Rice, Robert S. Garfinkel, Ram D. Gopal. CVC-STAR: Protecting data confidentiality while increasing flexibility and quality of responses
197 -- 217Anindya Chakraborty, Manoj K. Garg, Arun K. Majumdar, Shamik Sural. Attack recovery from malicious transactions in distributed database systems
218 -- 234Chien-Chuan Lin, Ming-Shi Wang. Genetic-clustering algorithm for intrusion detection system

Volume 2, Issue 1

4 -- 26Rupa Parameswaran, Douglas M. Blough. Privacy preserving data obfuscation for inherently clustered data
27 -- 47Shibnath Mukherjee, Zhiyuan Chen, Aryya Gangopadhyay. A fuzzy programming approach for data reduction and privacy in distance-based mining
48 -- 70Jie Wang, Jun Zhang 0001, Shuting Xu, Weijun Zhong. A novel data distortion approach via selective SSVD for privacy protection
71 -- 85Mohammad Saad Al-Ahmadi, Peter A. Rosen, Rick L. Wilson. Data mining performance on perturbed databases: important influences on classification accuracy
86 -- 105Daniel Ting, Stephen E. Fienberg, Mario Trottini. Random orthogonal matrix masking methodology for microdata release