Home // Sec

International Journal On Advances in Security, volume 11, numbers 1 and 2, 2018

Type: journal

Notes: A free access journal featuring works submitted on an invitation basis only.

ISSN: 1942-2636

Articles: there are 15 articles

Seven Steps to a Forever-Safe Cipher - (An Introduction to Poly-Substitution Encryption)
Julian Murguia Hughes
keywords: cipher; poly-substitution; unconditional security; perfect secrecy; inifinite computational power; quantum-resistant; cryptography; secrecy; unbreakability; privacy; encryption; quantum; computing; resistant; data.

An Elaborated Framework for Protecting Privacy in the IoT
George O. M. Yee
keywords: privacy protection, IoT, privacy policy, compliance, controller

Security and Privacy under a Unified Framework: A Review
Argyri Pattakou, Christos Kalloniatis, and Stefanos Gritzalis
keywords: security; privacy; requirements engineering methods; traditional architecture; cloud computing; unified framework

Security Hardening of Automotive Networks Through the Implementation of Attribute-Based Plausibility Checks
Marcel Rumez, Jürgen Dürrwang, Johannes Braun, and Reiner Kriesten
keywords: Automotive Safety and Security; Vehicular Attacks; Plausibility Checks; Vehicle Networks

Empirical Case Studies of the Root Cause Analysis Method in Information Security
Niclas Hellesen, Henrik Miguel Nacarino Torres, and Gaute Wangen
keywords: Information Security; Root cause analysis; Risk Management; Case study; Socio-technical; Empirical

Optimal Security Protection for Sensitive Data
George O. M. Yee
keywords: optimal, security protection, assessment, sensitive data, vulnerability

RMDM – Further Verification of the Conceptual ICT Risk-Meta-Data-Model - Verified with the underlying Risk Models of COBIT for Risk and COSO ERM 2017
Martin Latzenhofer and Gerald Quirchmayr
keywords: information and communication technology risk management; ICT risk-meta-data-model; COBIT for Risk; COSO ERM 2017; metamodeling; UML

A Survey on Open Forensics in Embedded Systems of Systems - From Automotive Considerations to a Larger Scope
Robert Altschaffel, Kevin Lamshöft, Stefan Kiltz, Mario Hildebrandt, and Jana Dittmann
keywords: computer forensics; embedded systems; forensic processes; industrial control systems; safety & security.

Proposal and Study on Implementation of Data Eavesdropping Protection Method over Multipath TCP Communication Using Data Scrambling and Path Dispersion
Toshihiko Kato, Shihan Cheng, Ryo Yamamoto, Satoshi Ohzahata, and Nobuo Suzuki
keywords: Multipath TCP; Eavesdropping; Data Dispersion; Data Scrambling; JProbe.

Empirical Analysis of Domain Blacklists
Tran Phuong Thao, Akira Yamada, and Ayumu Kubota
keywords: Web Security, Empirical Analysis, Blacklist, Malicious Domain, Whois Information, HTML Document, Text Mining

Simulating Blast Effects on High Security Vehicles with 3D Fluid-Structure Interaction
Arash Ramezani, Burghard Hillig, and Hendrik Rothe
keywords: CFD-FEM coupling methods; fully automatic structure analyses; high-performance computing techniques; blast loading; vehicle structure

Advanced Sound Static Analysis to Detect Safety- and Security-Relevant Programming Defects
Daniel Kästner, Laurent Mauborgne, Nicolas Grafe, and Christian Ferdinand
keywords: static analysis; abstract interpretation; runtime errors; security vulnerabilities; functional safety; cybersecurity

Integrating Autonomous Vehicle Safety and Security Analysis Using STPA Method and the Six-Step Model
Giedre Sabaliauskaite, Lin Shen Liew, and Jin Cui
keywords: Autonomous vehicle; safety; security; Six-Step Model; STPA

System Integrity Monitoring for Industrial Cyber Physical Systems
Rainer Falk and Steffen Fries
keywords: system integrity, device integrity; cyber physical systems; Internet of Things, embedded security; cyber security

A Block Cipher Masking Technique for Single and Multi-Paired-User Environments
Ray Hashemi, Amar Rasheed, Azita Bahrami, and Jeffrey Young
keywords: Cyber Security; Masking and Unmasking Ciphertext; V ariable-Block Cipher V accination; Masking Strength; Key Aggregation; Re-keying; Re-Profiling