Issue navigation
Volume 58, Issue 10, October 2015
Special Focus on Secure Information Systems Engineering
Section D
SPECIAL FOCUS ON SECURE INFORMATION SYSTEMS ENGINEERING
Special Issue on Secure Information Systems Engineering
David G. Rosado and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2193–2194, https://doi.org/10.1093/comjnl/bxv020
Privacy-Preserving Query Processing by Multi-Party Computation
Maryam Sepehri and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2195–2212, https://doi.org/10.1093/comjnl/bxu093
Privacy as an Integral Part of the Implementation of Cloud Solutions
Evangelia Kavakli and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2213–2224, https://doi.org/10.1093/comjnl/bxu118
A Trust Evaluation Model for Cloud Computing Using Service Level Agreement
D. Marudhadevi and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2225–2232, https://doi.org/10.1093/comjnl/bxu129
ISGcloud: a Security Governance Framework for Cloud Computing
Oscar Rebollo and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2233–2254, https://doi.org/10.1093/comjnl/bxu141
A Discussion of Communication Schemes for Process Execution Histories to Enforce Entailment Constraints in Process-Driven SOAs
Thomas Quirchmayr and Mark Strembeck
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2255–2279, https://doi.org/10.1093/comjnl/bxu071
The Robust Measurement Method for Security Metrics Generation
Katarzyna Mazur and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2280–2296, https://doi.org/10.1093/comjnl/bxu100
Reference Ontology for Cybersecurity Operational Information
Takeshi Takahashi and Youki Kadobayashi
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2297–2312, https://doi.org/10.1093/comjnl/bxu101
Modelling Security of Critical Infrastructures: A Survivability Assessment
Ricardo J. Rodríguez and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2313–2327, https://doi.org/10.1093/comjnl/bxu096
An Integrated Security and Systems Engineering Process and Modelling Framework
Jose Fran. Ruiz and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2328–2350, https://doi.org/10.1093/comjnl/bxu152
Modernizing Secure OLAP Applications with a Model-Driven Approach
Carlos Blanco and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2351–2367, https://doi.org/10.1093/comjnl/bxu070
Original Articles
Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms
Kazim Yumbul and Erkay Savaş
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2368–2387, https://doi.org/10.1093/comjnl/bxu040
Trust Enhanced Security for Tenant Transactions in the Cloud Environment
Udaya Tupakula and Vijay Varadharajan
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2388–2403, https://doi.org/10.1093/comjnl/bxu048
CHURNs: Freshness Assurance for Humans
Kenneth Radke and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2404–2425, https://doi.org/10.1093/comjnl/bxu073
Generalized Random Grid-Based Visual Secret Sharing for General Access Structures
Chunfeng Lian and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2426–2442, https://doi.org/10.1093/comjnl/bxu078
Hardware Accelerator to Detect Multi-Segment Virus Patterns
Xing Wang and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2443–2460, https://doi.org/10.1093/comjnl/bxu079
mvSERS: A Secure Emergency Response Solution for Mobile Healthcare in Vehicular Environments
Chanying Huang and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2461–2475, https://doi.org/10.1093/comjnl/bxu083
Malicious Nodes Identification for Complex Network Based on Local Views
Grazielle Vernize and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2476–2491, https://doi.org/10.1093/comjnl/bxu086
Forward-Secure Threshold Attribute-Based Signature Scheme
Jianghong Wei and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2492–2506, https://doi.org/10.1093/comjnl/bxu095
Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model
Debiao He and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2507–2508, https://doi.org/10.1093/comjnl/bxu097
One-Round Affiliation-Hiding Authenticated Asymmetric Group Key Agreement with Semi-trusted Group Authority
Chang Xu and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2509–2519, https://doi.org/10.1093/comjnl/bxu099
Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks
Shi-Feng Sun and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2520–2536, https://doi.org/10.1093/comjnl/bxu110
FEIPS: A Secure Fair-Exchange Payment System for Internet Transactions
Zoran Djuric and Dragan Gasevic
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2537–2556, https://doi.org/10.1093/comjnl/bxu120
Password Management: Distribution, Review and Revocation
Lanfranco Lopriore
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2557–2566, https://doi.org/10.1093/comjnl/bxu125
Modelling and Quantitative Verification of Reputation Systems Against Malicious Attackers
Amir Jalaly Bidgoly and Behrouz Tork Ladani
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2567–2582, https://doi.org/10.1093/comjnl/bxu130
Reversible Steganographic Method Using Complexity Control and Human Visual System
Wien Hong and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2583–2594, https://doi.org/10.1093/comjnl/bxu142
Trusted Validation for Geolocation of Cloud Data
Dong Lai Fu and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2595–2607, https://doi.org/10.1093/comjnl/bxu144
Annotated Control Flow Graph for Metamorphic Malware Detection
Shahid Alam and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2608–2621, https://doi.org/10.1093/comjnl/bxu148
Model-based Alignment of Heartbeat Morphology for Enhancing Human Recognition Capability
Md Saiful Islam and Naif Alajlan
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2622–2635, https://doi.org/10.1093/comjnl/bxu150
Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings
SK Hafizul Islam and Fagen Li
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2636–2648, https://doi.org/10.1093/comjnl/bxv002
On Designing Resilient Location-Privacy Obfuscators
Pericle Perazzo and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2649–2664, https://doi.org/10.1093/comjnl/bxv009
Revisiting Security Against the Arbitrator in Optimistic Fair Exchange
Yang Wang and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2665–2676, https://doi.org/10.1093/comjnl/bxv011
Cryptanalysis of WG Family of Stream Ciphers
Lin Ding and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2677–2685, https://doi.org/10.1093/comjnl/bxv024
PKE-AET: Public Key Encryption with Authorized Equality Test
Kaibin Huang and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2686–2697, https://doi.org/10.1093/comjnl/bxv025
Revocable Group Signature with Constant-Size Revocation List
Nuttapong Attrapadung and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2698–2715, https://doi.org/10.1093/comjnl/bxv026
A Generic Method for the Analysis of a Class of Cache Attacks: A Case Study for AES
Erkay Savaş and Cemal Yılmaz
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2716–2737, https://doi.org/10.1093/comjnl/bxv027
Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions
Mayana Pereira and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2738–2746, https://doi.org/10.1093/comjnl/bxv040
Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited
Wei Gao and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2747–2757, https://doi.org/10.1093/comjnl/bxv045
Toward a Taxonomy of Malware Behaviors
André Ricardo Abed Grégio and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2758–2777, https://doi.org/10.1093/comjnl/bxv047
Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption
Kaitai Liang and others
The Computer Journal, Volume 58, Issue 10, October 2015, Pages 2778–2792, https://doi.org/10.1093/comjnl/bxv050
Advertisement
Advertisement