Journal: IEEE Systems Journal

Volume 7, Issue 3

350 -- 0Sushil Jajodia, Pierangela Samarati. Guest Editorial
351 -- 362Angelo Rossi, Samuel Pierre, Suresh Krishnan. Secure Route Optimization for MIPv6 Using Enhanced CGA and DNSSEC
363 -- 373Teodor Sommestad, Mathias Ekstedt, Hannes Holm. The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures
374 -- 384Xiaofei Wang, Yang Xu, Junchen Jiang, Olga Ormond, Bin Liu, Xiaojun Wang. StriFA: Stride Finite Automata for High-Speed Regular Expression Matching in Network Intrusion Detection Systems
385 -- 395Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, Wendy Hui Wang. Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases
396 -- 409Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Sampath Kannan, Insup Lee, Boon Thau Loo, Oleg Sokolsky. AS-CRED: Reputation and Alert Service for Interdomain Routing
410 -- 419Mingwu Zhang, Tsuyoshi Takagi. Efficient Constructions of Anonymous Multireceiver Encryption Protocol and Their Deployment in Group E-mail Systems With Privacy Preservation
420 -- 429Fagen Li, Hui Zhang, Tsuyoshi Takagi. Efficient Signcryption for Heterogeneous Systems
430 -- 441Suku Nair, Omar Al-Ibrahim, Subil Abraham. State Machine-Based Security Fusion for Resource-Constrained Environments
442 -- 454Salah-Eddine Tbahriti, Chirine Ghedira, Brahim Medjahed, Michael Mrissa, Djamal Benslimane. How to Enhance Privacy Within DaaS Service Composition?
455 -- 466Amir Averbuch, Michael Kiperberg, Nezer Jacob Zaidenberg. Truly-Protect: An Efficient VM-Based Software Protection
467 -- 477Thomas E. Dube, Richard A. Raines, Michael R. Grimaila, Kenneth W. Bauer Jr., Steven K. Rogers. Malware Target Recognition of Unknown Threats
478 -- 488Dawei Li, Xiaoyan Hong, Darwin Witt. ProtoGENI, a Prototype GENI Under Security Vulnerabilities: An Experiment-Based Security Study
489 -- 500Len Sassaman, Meredith L. Patterson, Sergey Bratus, Michael E. Locasto. Security Applications of Formal Language Theory
501 -- 515Ramadan Abdunabi, Mustafa Al-Lail, Indrakshi Ray, Robert B. France. Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model