Journal: JoWUA

Volume 1, Issue 4

1 -- 2Kangbin Yim. Guest Editorial: Advances in Trust Management
3 -- 15Jie Zhang 0002, Chen Chen, Robin Cohen. A Scalable and Effective Trust-Based Framework for Vehicular Ad-Hoc Networks
16 -- 34Nurit Gal-Oz, Tal Grinshpoun, Ehud Gudes. Privacy Issues with Sharing and Computing Reputation across Communities
35 -- 49Anand Nagarajan, Christian Damsgaard Jensen. A Generic Role Based Access Control Model for Wind Power Systems
50 -- 61James Stanier, Stephen Naicken, Anirban Basu, Jian Li, Ian Wakeman. Can We Use Trust in Online Dating?
62 -- 74Anders Kofod-Petersen, Jörg Cassens. Proxies for Privacy in Ambient Systems
75 -- 91Gabriele Costa, Aliaksandr Lazouski, Fabio Martinelli, Ilaria Matteucci, Valérie Issarny, Rachid Saadi, Nicola Dragoni, Fabio Massacci. Security-by-Contract-with-Trust for Mobile Devices

Volume 1, Issue 2/3

1 -- 2Jong-Hyouk Lee, Fumio Teraoka. Guest Editorial: Advances in Wireless Mobile and Sensor Technologies
3 -- 15Ved P. Kafle, Masugi Inoue. Locator ID Separation for Mobility Management in the New Generation Network
16 -- 35Carlos Jesus Bernardos, Marco Gramaglia, Luis M. Contreras, María Calderón, Ignacio Soto. Network-based Localized IP mobility Management: Proxy Mobile IPv6 and Current Trends in Standardization
36 -- 51Sawako Kiriyama, Ryuji Wakikawa, Jinwei Xia, Fumio Teraoka. Context Reflector for Proxy Mobile IPv6
52 -- 70Zhiwei Yan, Huachun Zhou, Ilsun You. N-NEMO: A Comprehensive Network Mobility Solution in Proxy Mobile IPv6 Network
71 -- 82Van Quang Bien, R. Venkatesha Prasad, Ignas G. Niemegeers. Handoff in Radio over Fiber Indoor Networks at 60 GHz
83 -- 95Jingbo Sun, Yue Wang 0007, Hongbo Si, Jian Yuan, Xiuming Shan. Aggregate Human Mobility Modeling Using Principal Component Analysis
96 -- 106Youn-Hee Han, Chan-Myung Kim, Joon-Min Gil. A Greedy Algorithm for Target Coverage Scheduling in Directional Sensor Networks
107 -- 122Antonio J. Jara, Miguel A. Zamora, Antonio F. Gómez-Skarmeta. An Initial Approach to Support Mobility in Hospital Wireless Sensor Networks based on 6LoWPAN (HWSN6)

Volume 1, Issue 1

1 -- 2Ilsun You. Editorial
3 -- 13Malek Ben Salem, Salvatore J. Stolfo. Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques
14 -- 28Ludwig Fuchs, Günther Pernul. Reducing the Risk of Insider Misuse by Revising Identity Management and User Account Data
29 -- 45Debin Liu, L. Jean Camp, Xiaofeng Wang, Lusha Wang. Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders
46 -- 55Kyungroul Lee, Hyeungjun Yeuk, Youngtae Choi, Sitha Pho, Ilsun You, Kangbin Yim. Safe Authentication Protocol for Secure USB Memories
56 -- 71Valérie Viet Triem Tong, Andrew Clark, Ludovic Mé. Specifying and Enforcing a Fine-Grained Information Flow Policy: Model and Experiments
72 -- 85Que Nguyet Tran Thi, Tran Khanh Dang. Towards Side-Effects-free Database Penetration Testing
86 -- 97Mucheol Kim, Jiwan Seo, Sanhyun Noh, Sangyong Han. Reliable Social Trust Management with Mitigating Sparsity Problem