Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
2. A semantic-aware role-based access control model for pervasive computing environments

A. Javadi; M. Amini

Volume 5, Issue 2 , Summer and Autumn 2013, Pages 119-140


  Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information ...  Read More

Research Article
3. A computational model and convergence theorem for rumor dissemination in social networks

M. Amoozgar; R. Ramezanian

Volume 5, Issue 2 , Summer and Autumn 2013, Pages 141-154


  The spread of rumors, which are known as unverified statements of uncertain origin, may threaten the society and it's controlling, is important for national security councils of countries. If it would be possible to identify factors affecting spreading a rumor (such as agents’ desires, trust network, ...  Read More

Research Article
4. GTrust: a group based trust model

M. Ezhei; B. Tork Ladani

Volume 5, Issue 2 , Summer and Autumn 2013, Pages 155-170


  Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this ...  Read More

Research Article
5. Prediction of user's trustworthiness in web-based social networks via text mining

H. Mohammadhassanzadeh; H. R. Shahriari

Volume 5, Issue 2 , Summer and Autumn 2013, Pages 171-187


  In Social networks, users need a proper estimation of trust in others to be able to initialize reliable relationships. Some trust evaluation mechanisms have been offered, which use direct ratings to calculate or propagate trust values. However, in some web-based social networks where users only have ...  Read More

Research Article
6. Convertible limited (multi-) verifier signature: new constructions and applications

S. Avizheh; M. Rajabzadeh Asaar; M. Salmasizadeh

Volume 5, Issue 2 , Summer and Autumn 2013, Pages 189-208


  A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we ...  Read More

Research Article
7. STLR: a novel danger theory based structural TLR algorithm

R. Azmi; B. Pishgoo

Volume 5, Issue 2 , Summer and Autumn 2013, Pages 209-225


  Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called ...  Read More