Journal of Information Assurance and Security

Volume 6, Issue 2, 2011

  Page no.
   
A Heuristic Approach for Qualitative Risk Assessment and Treatment Model
81
Javaria Sana , M. Hasan Islam and Bushra Fayyaz

 
 
 
 
Joint and Conditional Guesswork: Definitions and Implications
89
Reine Lundin and Stefan Lindskog  
   
Modeling Alerts for IDS Correlation
98
Sebastian Roschke, Feng Cheng, and Christoph Meinel
 
   
A Cooperative Model for Resource Sharing on Grid
106
Alessio Merlo  
   
An Integrated Approach to Security Risk Management for IT-Intensive Organizations
115
Jeffrey Mounzer, Tansu Alpcan, and Nicholas Bambos
 
   
Anonymous Communication System Based on Multiple Loopbacks
124
Kazuhiro Kono, Shinnosuke Nakano, Yoshimichi Ito, and Noboru Babaguchi  
   
Anomaly Detection for In-Vehicle Networks using a Sensor-based Approach
132
Michael Müter, André Groll and Felix C. Freiling
 
   
Attribute Relations Specifications and Constraints Using Attribute Based Mechanism of Policy Machine
141
Vincent C. Hu, David D. Ferraiolo, Serban Gavrila  
   
 
 
Authentication Aura - A distributed approach to user authentication
149
C. G. Hocking, S. M. Furnell, N. L. Clarke and P. L. Reynolds  
   

Copyright ?2005 - 2010, Dynamic Publishers Inc., USA



No part of Journal of Information Assurance and Security may be reproduced or transmitted in any form or by any means without written permission from the publisher. Journal of Information Assurance and Security has been registered with the Copyright Clearance Center (CCC) Transactional Reporting Services. Consent is given for coping of articles for personal or internal use, or for the personal use of specific clients provided that the base fee $05.00 (per copy, per article) is paid directly to CCC, 27 Congress St., Salem, MA 01970, USA. For those organizations that have been granted a photo copy license by CCC, a separate system of payment has been arranged. The fee code for users of the Transactional Reporting Service is 1060 5369/93 $03.50.