Journal: ISeCure

Volume 3, Issue 2

67 -- 68Rasool Jalili. Editorial
69 -- 76Phillip Rogaway. Constructing cryptographic definitions
77 -- 101Hamid Farhadi, Maryam AmirHaeri, Mohammad Khansari. Alert correlation and prediction using data mining and HMM
103 -- 120Zahra Derakhshandeh, Behrouz Tork Ladani. A model for specification, composition and verification of access control policies and its application to web services
121 -- 133Somayeh Soltani, Mohammad Ali Hadavi, Rasool Jalili. Separating indexes from data: a distributed scheme for secure database outsourcing