Journal: JoWUA

Volume 3, Issue 4

1 -- 3Kouichi Sakurai, Dieter Gollmann. Managing Insider Security Threats (MIST 2012 Volume 1)
4 -- 20William R. Claycomb, Carly L. Huth, Lori Flynn, David M. Mcintire, Todd B. Lewellen. Chronological Examination of Insider Threat Sabotage: Preliminary Observations
21 -- 34Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake. Design of Categorization Mechanism for Disaster-Information-Gathering System
35 -- 45Byungha Choi, Kyungsan Cho. Detection of Insider Attacks to the Web Server
46 -- 60S. Sree Vivek, S. Sharmila Deva Selvi, Ramarathnam Venkatesan, C. Pandu Rangan. A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network
61 -- 71Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li 0002, Hui Zhu, Siqi Ma, Xiaofeng Chen 0001. A New Efficient Verifiable Fuzzy Keyword Search Scheme
72 -- 84S. Sree Vivek, S. Sharmila Deva Selvi, Salini Selvaraj Kowsalya, C. Pandu Rangan. PKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction
85 -- 99Kangwon Lee, Kyungroul Lee, Jaecheon Byun, Sunghoon Lee, Hyobeom Ahn, Kangbin Yim. Extraction of Platform-unique Information as an Identifier

Volume 3, Issue 3

1 -- 3Fatos Xhafa. Advances in Mobility Services and Protocols for Cognitive and Ubiquitous Applications
4 -- 20Chyi-Ren Dow, Yu-Hong Lee, Pa Hsuan, Yi-Tung Lee, Shiow-Fen Hwang. Omnibone: An Efficient Service Data Circulation and Discovery Scheme in VANETs
21 -- 40Muhammad Awais Azam, Jonathan Loo, Sardar Kashif Ashraf Khan, Usman Naeem, Muhammad Adeel, Waleed Ejaz. Behavioural Patterns Analysis of Low Entropy People Using Proximity Data
41 -- 49Karl Andersson, Muslim Elkotob. Rethinking IP Mobility Management
50 -- 73Clara Maria Colombini, Antonio Colella. Digital scene of crime: technique of profiling users
74 -- 93Noriki Uchida, Kazuo Takahata, Yoshitaka Shibata, Norio Shiratori. Never Die Network Based on Cognitive Wireless Network and Satellite System for Large Scale Disaster
94 -- 112Amy Poh Ai Ling, Kokichi Sugihara, Masao Mukaidono. Enhancing Smart Grid System Processes via Philosophy of Security - Case Study based on Information Security Systems -

Volume 3, Issue 1/2

1 -- 3Yoshiaki Hori, William Claycomb, Kangbin Yim. Frontiers in Insider Threats and Data Leakage Prevention
4 -- 12Dieter Gollmann. From Insider Threats to Business Processes that are Secure-by-Design
13 -- 29Malek Ben Salem, Salvatore J. Stolfo. Combining Baiting and User Search Profiling Techniques for Masquerade Detection
30 -- 54Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto. A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries
55 -- 71Takashi Nishide, Shingo Miyazaki, Kouichi Sakurai. Security Analysis of Offline E-cash Systems with Malicious Insider
72 -- 81Yuanjie Zhao, Xiaofeng Chen 0001, Hua Ma, Qiang Tang, Hui Zhu. A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search
82 -- 98Shuyuan Mary Ho, Hwajung Lee. A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications
99 -- 119Takayuki Sasaki. A Framework for Detecting Insider Threats using Psychological Triggers
120 -- 137Ruo Ando, Kazushi Takahashi, Kuniyasu Suzaki. Inter-domain Communication Protocol for Real-time File Access Monitor of Virtual Machine