Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
ORIGINAL RESEARCH PAPER
2. A semantic-aware role-based access control model for pervasive computing environments

A. Javadi; M. Amini

Volume 5, Issue 2 , Summer and Autumn 2013, Pages 119-140

http://dx.doi.org/10.22042/isecure.2014.5.2.2

Abstract
  Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information ...  Read More

ORIGINAL RESEARCH PAPER
3. A computational model and convergence theorem for rumor dissemination in social networks

M. Amoozgar; R. Ramezanian

Volume 5, Issue 2 , Summer and Autumn 2013, Pages 141-154

http://dx.doi.org/10.22042/isecure.2014.5.2.3

Abstract
  The spread of rumors, which are known as unverified statements of uncertain origin, may threaten the society and it's controlling, is important for national security councils of countries. If it would be possible to identify factors affecting spreading a rumor (such as agents’ desires, trust network, ...  Read More

ORIGINAL RESEARCH PAPER
4. GTrust: a group based trust model

M. Ezhei; B. Tork Ladani

Volume 5, Issue 2 , Summer and Autumn 2013, Pages 155-170

http://dx.doi.org/10.22042/isecure.2014.5.2.4

Abstract
  Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this ...  Read More

ORIGINAL RESEARCH PAPER
5. Prediction of user's trustworthiness in web-based social networks via text mining

H. Mohammadhassanzadeh; H. R. Shahriari

Volume 5, Issue 2 , Summer and Autumn 2013, Pages 171-187

http://dx.doi.org/10.22042/isecure.2014.5.2.5

Abstract
  In Social networks, users need a proper estimation of trust in others to be able to initialize reliable relationships. Some trust evaluation mechanisms have been offered, which use direct ratings to calculate or propagate trust values. However, in some web-based social networks where users only have ...  Read More

ORIGINAL RESEARCH PAPER
6. Convertible limited (multi-) verifier signature: new constructions and applications

S. Avizheh; M. Rajabzadeh Asaar; M. Salmasizadeh

Volume 5, Issue 2 , Summer and Autumn 2013, Pages 189-208

http://dx.doi.org/10.22042/isecure.2014.5.2.6

Abstract
  A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we ...  Read More

ORIGINAL RESEARCH PAPER
7. STLR: a novel danger theory based structural TLR algorithm

R. Azmi; B. Pishgoo

Volume 5, Issue 2 , Summer and Autumn 2013, Pages 209-225

http://dx.doi.org/10.22042/isecure.2014.5.2.7

Abstract
  Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called ...  Read More