Home // Sec
International Journal On Advances in Security, volume 2, numbers 2 and 3, 2009
Type: journal
Notes: A free access journal featuring works submitted on an invitation basis only.
ISSN: 1942-2636
Articles: there are 14 articles
Post-Payment Copyright System versus Online Music Shop: Business Model and Privacy
Heikki Kokkinen, Mikko V. J. Heikkinen, and Markus Miettinen
keywords: business model; copyright; post-payment system; privacy; risk analysis; security; techno-economic modeling
A Holistic Approach to Open Source VoIP Security: Results from the EUX2010SEC Project
Lothar Fritsch, Arne-Kristian Groven, Lars Strand, Wolfgang Leister, and Anders Moen Hagalisletto
keywords: VoIP, SIP, security model, security requirements, testbed testing, formal protocol analysis.
Encoding Subsystem Codes
Pradeep Sarvepalli and Andreas Klappenecker
keywords: Clifford codes; encoding; quantum codes; stabilizer codes; subsystem codes;
Security and User Aspects in the Design of the Future Trusted Ambient Networked Systems
Seppo Heikkinen, Kari Heikkinen, and Sari Kinnari
keywords: Ambient Networks, design, security, trust, user experience
Networking and Security Issues for Remote Gaming: The Approach of G@L
Christos Bouras, Vassilis Poulopoulos, and Vassilis Tsogkas
keywords: remote control channel, online gaming, remote command execution, input device capturing, asymmetric encryption, reverse channel
Distributed GIS Approach for Flood Risk Assessment
Rifaat Abdalla
keywords: WebGIS, GSN, GeoICT
A Legal Evaluation of Pseudonymization Approaches
Thomas Neubauer and Mathias Kolb
keywords: security, privacy, pseudonymization, e-health
Business Intelligence Based Malware Log Data Analysis as an Instrument for Security Information and Event Management
Tobias Hoppe, Alexander Pastwa, and Sebastian Sowa
keywords: Business Intelligence; Data Mining; Malware; Online Analytical Processing; Security Information and Event Management
Enhancing Information Reliability through Backwards Propagation Of Distrust
Panagiotis Metaxas
keywords: Web search; Information Reliability; Web graph; Link structure; Web Trust; Web Spam
Assuring Quality in Vulnerability Reports for Security Risk Analysis
Deepak Subramanian, Le Ha Thanh, and Peter Kok Keong Loh
keywords: Fuzzy classifiers, confidence level, calibration, scanner, vulnerability, web application
Security Analysis of Private Data Enquiries in Erlang
Florian Kammüller and Reiner Kammüller
keywords: Privacy; distribution; noninterference; type systems
An Integrated System for Intelligence, Surveillance and Reconnaissance (ISR)
Barbara Essendorfer, Eduardo Monari, and Heiko Wanning
keywords: client-server architecture, sensor/exploitation/ information system, information/ data fusion, ISR
Design Patterns for a Systemic Privacy Protection
Kajetan Dolinar, Jan Porekar, and Aleksej Jerman Blažič
keywords: design patterns, privacy protection cycle
Threats to the Swarm: Security Considerations for Swarm Robotics
Fiona Higgins, Allan Tomlinson, and Keith M. Martin
keywords: swarm robotics, security, autonomy, adaption, emergent behavior