Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
1. Interdependent Security Game Design over Constrained Linear Influence Networks

Seyed Alireza Hasheminasab; Behrouz Tork Ladani; Tansu Alpcan

Volume 11, Issue 2 , Summer and Autumn 2019, , Pages 95-111

http://dx.doi.org/10.22042/isecure.2019.186923.467

Abstract
  In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to ...  Read More

2. GGRA: a grouped gossip-based reputation aggregation algorithm

S. Ghasemi Falavarjani; Behrouz Tork Ladani; S. Ghasemi

Volume 7, Issue 1 , Winter and Spring 2015, , Pages 59-74

http://dx.doi.org/10.22042/isecure.2015.7.1.6

Abstract
  An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behavior, is one of the proposed solutions to detect and isolate malicious (low ranked) nodes. Gossip Trust is an interesting ...  Read More

3. GTrust: a group based trust model

M. Ezhei; B. Tork Ladani

Volume 5, Issue 2 , Summer and Autumn 2013, , Pages 155-170

http://dx.doi.org/10.22042/isecure.2014.5.2.4

Abstract
  Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this ...  Read More

4. A model for specification, composition and verification of access control policies and its application to web services

Z. Derakhshandeh; B. Tork Ladani

Volume 3, Issue 2 , Summer and Autumn 2011, , Pages 103-120

http://dx.doi.org/10.22042/isecure.2015.3.2.4

Abstract
  Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access ...  Read More