- Ilsun YOU
Editor-in-Chief
isyou@bible.ac.kr
Editorial
I would like to warmly welcome readers to the volume 5, number 4 of Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. In addition, I am very delight to see that the volume 5 is now well ended. This issue is composed of six regular articles, which provide useful and meaningful research results related to the fields of the wireless mobile networks, ubiquitous computing, and dependable applications. The first article “Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently” [1] aims at allowing patients to control the access to their Personal Health Record (PHR) efficiently and easily though the emerging cloud technology. For this goal, the authors propose the notion of Online/Offline Ciphertext-Policy Attribute- Based Proxy Re-Encryption scheme (OOCP-AB-PRE) and a set of security requirements while defining two security models, which cover both outsider and insider attacks. Moreover, a concrete OO-CP-AB-PRE construction is built, and proven to be secure under the well known complexity assumptions and follow the defined security models. In the second article “Anomaly Detection in Computer Networks: A State-of-the-Art Review” [2], the authors survey the state-of-the-art studies on the problem of anomaly detection in computer networks. They don’t only describe the anomaly detection problem and the different categorizations of its solutions, but also introduce some recent state-of-the-art solutions on the network level and current trends in handling malware-induced anomalies in smartphone networks. Furthermore, the presented solutions are evaluated while their shortcomings are highlighted.