Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 2 (2010)
Volume 1 (2009)
Review Article
2. Constructing cryptographic definitions

P. Rogaway

Volume 3, Issue 2 , Summer and Autumn 2011, Pages 69-76


  This paper mirrors an invited talk to ISCISC 2011. It is not a conventional paper so much as an essay summarizing thoughts on a little-talked-about subject. My goal is to intermix some introspection about definitions with examples of them, these examples drawn mostly from cryptography. Underpinning our ...  Read More

Research Article
3. Alert correlation and prediction using data mining and HMM

H. Farhadi; M. AmirHaeri; M. Khansari

Volume 3, Issue 2 , Summer and Autumn 2011, Pages 77-101


  Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, ...  Read More

Research Article
4. A model for specification, composition and verification of access control policies and its application to web services

Z. Derakhshandeh; B. Tork Ladani

Volume 3, Issue 2 , Summer and Autumn 2011, Pages 103-120


  Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access ...  Read More

Research Article
5. Separating indexes from data: a distributed scheme for secure database outsourcing

S. Soltani; M. A. Hadavi; R. Jalili

Volume 3, Issue 2 , Summer and Autumn 2011, Pages 121-133


  Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares ...  Read More