Journal: JoWUA

Volume 5, Issue 4

1 -- 2Ilsun You. Editorial
3 -- 28Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong. Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently
29 -- 64Sherenaz W. Al-Haj Baddar, Alessio Merlo, Mauro Migliardi. Anomaly Detection in Computer Networks: A State-of-the-Art Review
65 -- 85Tapas Pandit, Rana Barua, Somanath Tripathy. eCK Secure Single Round ID-based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy (Extended Version)
86 -- 102Igor Saenko, Igor V. Kotenko. Design of Virtual Local Area Network Scheme Based on Genetic Optimization and Visual Analysis
103 -- 119Alessandro Armando, Giantonio Chiarelli, Gabriele Costa, Gabriele De Maglie, Rocco Mammoliti, Alessio Merlo. Mobile App Security Analysis with the MAVeriC Static Analysis Module
120 -- 127Kyoungjae Sun, Younghan Kim. Flow Mobility Management in PMIPv6-based DMM (Distributed Mobility Management) Networks

Volume 5, Issue 3

1 -- 2Ilsun You. Editorial
3 -- 13Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai. Efficient variant of Rainbow using sparse secret keys
14 -- 29Igor V. Kotenko, Elena Doynikova. Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing
30 -- 43Kurt Stenzel, Kuzman Katkalov, Marian Borek, Wolfgang Reif. A Model-Driven Approach to Noninterference
44 -- 62Christoph Hochreiner, Peter FrÃ1/4hwirt, Zhendong Ma, Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl. Genie in a Model? Why Model Driven Security will not secure your Web Application
63 -- 78Tomoya Tanjo, Kazuhiro Minami, Ken Mano, Hiroshi Maruyama. Evaluating data utility of privacy-preserving pseudonymized location datasets
79 -- 93Raihan Ul Islam, Mischa Schmidt, Hans-Joerg Kolbe, Karl Andersson. Secure and Scalable Multimedia Sharing between Smart Homes

Volume 5, Issue 2

1 -- 6William R. Claycomb, Philip A. Legg, Dieter Gollmann. Guest Editorial: Emerging Trends in Research for Insider Threat Detection
7 -- 23David A. Mundie, Samuel J. Perl, Carly Huth J. D.. Insider Threat Defined: Discovering the Prototypical Case
24 -- 38Alexander D. Kent, Lorie M. Liebrock, James Wernicke. Differentiating User Authentication Graphs
39 -- 58Hoda Eldardiry, Kumar Sricharan, Juan Liu, John Hanley, Bob Price, Oliver Brdiczka, Eugene Bart. Multi-source fusion for anomaly detection: using across-domain and across-time peer-group consistency checks
59 -- 79Florian Kammüller, Christian W. Probst. Invalidating Policies using Structural Information
80 -- 94Brian Lindauer, Joshua Glasser, Mitch Rosen, Kurt Wallnau1. Generating Test Data for Insider Threat Detectors

Volume 5, Issue 1

1 -- 3Fang-Yie Leu, A. Min Tjoa. Guest Editorial: Emerging Software Reliability and System Security Technologies
4 -- 36Thanh-Trung Pham, François Bonnet, Xavier Défago. Reliability Prediction for Component-based Software Systems with Architectural-level Fault Tolerance Mechanisms (Extended Version)
37 -- 63Kristian Beckers, Maritta Heisel, Denis Hatebur. Supporting Common Criteria Security Analysis with Problem Frames
64 -- 83Iulian Goriac. Plausibilistic Entropy and Anonymity
84 -- 100Johannes Götzfried, Tilo Müller. Analysing Android's Full Disk Encryption Feature
101 -- 121Benjamin Aziz, Geoff W. Hamilton. Enforcing Reputation Constraints on Business Process Workflows
122 -- 141Sangeetha Jose, Akash Gautam, Chandrasekaran Pandurangan. A New Certificateless Blind Signature Scheme