Journal: JoWUA

Volume 2, Issue 4

1 -- 3Edgar R. Weippl, A Min Tjoa, Günther Pernul. Guest Editorial: Advances in Applied Security
4 -- 26Maria Leitner, Juergen Mangler, Stefanie Rinderle-Ma. SPRINT- Responsibilities: Design and Development of Security Policies in Process-aware Information Systems
27 -- 41Stefan Rass, Raphael Wigoutschnigg, Peter Schartner. Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and Receiver-Anonymity
42 -- 58Rainer Poisel, Simon Tjoa, Paul Tavolato. Advanced File Carving Approaches for Multimedia Files
59 -- 83Aniello Castiglione, Bonaventura D'Alessio, Alfredo De Santis, Francesco Palmieri. Hiding Information into OOXML Documents: New Steganographic Perspectives
84 -- 101Cornelius Moucha, Enrico Lovat, Alexander Pretschner. A virtualized usage control bus system

Volume 2, Issue 3

1 -- 3Fang-Yie Leu. Emerging Security Technologies and Applications
4 -- 25Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi. Efficient and Low-Cost RFID Authentication Schemes
26 -- 52Ilsun You, Yoshiaki Hori, Kouichi Sakurai. Enhancing SVO Logic for Mobile IPv6 Security Protocols
53 -- 73Tanveer A. Zia, Albert Y. Zomaya. A Lightweight Security Framework for Wireless Sensor Networks
74 -- 84Nasrollah Pakniat, Ziba Eslami. A Proxy E-Raffle Protocol Based on Proxy Signatures
85 -- 95Fuw-Yi Yang, Zhen-Wei Liu, Su-Hui Chiu. Mobile Banking Payment System
96 -- 107Yi-Li Huang, Fang-Yie Leu. Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other

Volume 2, Issue 2

1 -- 18Tomoya Enokido, Ailixier Aikebaier, Makoto Takizawa. Computation and Transmission Rate Based Algorithm for Reducing the Total Power Consumption
19 -- 32Peyman TalebiFard, Victor C. M. Leung. Context-Aware Mobility Management in Heterogeneous Network Environments
33 -- 45Hsiao-Han Chen, Yi-Bing Lin, Yingrong Coral Sung, Ren-Huang Liou. Direction-based Wireless Remote Controller: A Smartphone Application
46 -- 66Abu Zafar M. Shahriar, Mohammed Atiquzzaman, William D. Ivancic. Evaluation of the Route Optimization for NEMO in Satellite Networks
67 -- 82Luis M. Contreras, Carlos Jesus Bernardos, Ignacio Soto. RAMS: A Protocol Extension to PMIPv6 for Improving Handover Performance of Multicast Traffic
83 -- 94Yoshiaki Shiraishi, Masami Mohri, Youji Fukuta. A Server-Aided Computation Protocol Revisited for Confidentiality of Cloud Service

Volume 2, Issue 1

1 -- 3Christian W. Probst, Ilsun You, Dongwan Shin, Kouichi Sakurai. Addressing Insider Threats and Information Leakage
4 -- 27Jeffrey Hunker, Christian W. Probst. Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques
28 -- 49Andrew P. Moore, Dawn M. Cappelli, Thomas C. Caron, Eric D. Shaw, Derrick Spooner, Randall F. Trzeciak. A Preliminary Model of Insider Theft of Intellectual Property
50 -- 62Shinsaku Kiyomoto, Keith M. Martin. Model for a Common Notion of Privacy Leakage on Public Database
63 -- 74Carol J. Fung. Collaborative Intrusion Detection Networks and Insider Attacks
75 -- 92Wolter Pieters. Representing Humans in System Security Models: An Actor-Network Approach
93 -- 102Philip Nobles, Shahid Ali, Howard Chivers. Improved Estimation of Trilateration Distances for Indoor Wireless Intrusion Detection
103 -- 120Giovanni Di Crescenzo, Abhrajit Ghosh, Abhinay Kampasi, Rajesh Talpade, Yin Zhang. Detecting Anomalies in Active Insider Stepping Stone Attacks