Home // Sec

International Journal On Advances in Security, volume 4, numbers 1 and 2, 2011

Type: journal

Notes: A free access journal featuring works submitted on an invitation basis only.

ISSN: 1942-2636

Articles: there are 12 articles

Role of User Profile in Cloud-based Collaboration Services for Innovation
Zahid Iqbal, Josef Noll, and Sarfraz Alam
keywords: Cloud Computing, Collaboration, Enterprise, Innovation, Privacy, Social Computing, Trust, User Profile

Fault Tolerance Framework using Model-Based Diagnosis: Towards Dependable Business Processes
Angel Jesus Varela Vaca, Rafael Martinez Gasca, Diana Borrego Nuñez, and Sergio Pozo Hidalgo
keywords: Business process, Business Process Management, Fault-tolerance, Dependability

Putting Theory into Practice: The Results of a Practical Implementation of the Secure Development Life Cycle
Cynthia Lester
keywords: – agile methods; secure software development service-learning; software development; software engineering; software security; traditional software development methodologies

Verification of Detection Methods for Robust Human Tracking System
Hiroto Kakiuchi, Takao Kawamura, Toshihiko Sasama, and Kazunori Sugahara
keywords: Detection Method; Human Tracking; Mobile Agent

PIGA-HIPS: Protection of a shared HPC cluster
Mathieu Blanc, Jeremy Briffaut, Damien Gros, and Christian Toinard
keywords: Security Property, Mandatory Access Control, High Performance Computing Security.

Tailored Concepts for Software Integrity Protection in Mobile Networks
Manfred Schäfer and Wolf-Dietrich Moeller
keywords: Software integrity protection; secure execution environment; code signing; trust management; Evolved Packet System (EPS); autonomous validation;

Advanced Policies Management for the Support of the Administrative Delegation in Federated Systems
Manuel Gil Pérez, Gabriel López, Antonio F. Gómez Skarmeta, and Aljosa Pasic
keywords: administrative delegation, authorization policies, identity federation, access control

An Adaptive and Dependable Distributed Monitoring Framework
Teemu Kanstrén, Reijo Savola, Sammy Haddad, and Artur Hecker
keywords: monitoring, framework, security assurance, adaptation, dependability

Security Test Approach for Automated Detection of Vulnerabilities of SIP-based VoIP Softphones
Christian Schanes, Stefan Taber, Karin Popp, Florian Fankhauser, and Thomas Grechenig
keywords: Software testing; Computer network security; Graphical user interfaces; Internet telephony; Fuzzing

Genomics-based Security Protocols: From Plaintext to Cipherprotein
Harry Shaw, Sayed Hussein, and Hermann Helgert
keywords: HMAC; keyed Hash Message Authentication Code; Cryptography; DNA; PKI; public key infrastructure; MANET; cipherprotein; epigenetics; security architecture

Evaluating Quality of Chaotic Pseudo-Random Generators. Application to Information Hiding
Jacques Bahi, Xiaole Fang, Christophe Guyeux, and Qianxue Wang
keywords: Internet security; Pseudo-random number generator; Chaotic sequences; Statistical tests; Discrete chaotic iterations; Information hiding.

Touch'n Trust: An NFC-Enabled Trusted Platform Module
Michael Hutter and Ronald Tögl
keywords: Trusted Computing; RFID Security; Near Field Communication; NFC; ECDSA; Remote Attestation