Volume 4, Number 1 (March 2013) BibTex
Frontiers in Security and Dependability
- pp. 1-3 (DOI:10.22667/JOWUA.2013.03.31.001)
Guest Editorial: Frontiers in Security and Dependability
Edgar R. Weippl, A Min Tjoa, and Simon Tjoa - pp. 4-31 (DOI:10.22667/JOWUA.2013.03.31.004)
From Computationally-Proved Protocol Specifications to Implementations and Application to SSH
David Cadé and Bruno Blanchet
[Abstract] - pp. 32-54 (DOI:10.22667/JOWUA.2013.03.31.032)
Forward-Secure Identity-Based Signature: New Generic Constructions and Their Applications
Noura Al Ebri, Joonsang Baek, Abdulhadi Shoufan, and Quang Hieu Vu
[Abstract] - pp. 55-75 (DOI:10.22667/JOWUA.2013.03.31.055)
Design and Formal Analysis of A Group Signature Based Electronic Toll Pricing System
Xihui Chen, Gabriele Lenzini, Sjouke Mauw, and Jun Pang
[Abstract] - pp. 76-97 (DOI:10.22667/JOWUA.2013.03.31.076)
Securing a Space-Based Service Architecture with Coordination-Driven Access Control
Stefan Craß, Tobias Dönz, Gerson Joskowicz, eva Kühn, and Alexander Marek
[Abstract] - pp. 98-117 (DOI:10.22667/JOWUA.2013.03.31.098)
Comparative Analysis of Voting Schemes for Ensemble-based Malware Detection
Raja Khurram Shahzad and Niklas Lavesson
[Abstract] - pp. 118-134 (DOI:10.22667/JOWUA.2013.03.31.118)
A Framework for Dependability Consensus Building and In-Operation Assurance
Yutaka Matsuno and Shuichiro Yamamoto
[Abstract] - pp. 135-152 (DOI:10.22667/JOWUA.2013.03.31.135)
Evidence and Cloud Computing: The Virtual Machine Introspection Approach
Rainer Poisel, Erich Malzer, and Simon Tjoa
[Abstract]
[Return to Archives]