Table of Contents, vol 11, no 1&2, year 2018

pages: 1 - 26
Seven Steps to a Forever-Safe Cipher - (An Introduction to Poly-Substitution Encryption)
Julian Murguia Hughes, Independent Researcher, Uruguay

pages: 27 - 38
An Elaborated Framework for Protecting Privacy in the IoT
George O. M. Yee, Aptusinnova Inc. and Carleton University, Canada

pages: 39 - 51
Security and Privacy under a Unified Framework: A Review
Argyri Pattakou, UNIVERSITY OF THE AEGEAN, GREECE
Christos Kalloniatis, UNIVERSITY OF THE AEGEAN, GREECE
Stefanos Gritzalis, UNIVERSITY OF THE AEGEAN, GREECE

pages: 52 - 59
Security Hardening of Automotive Networks Through the Implementation of Attribute-Based Plausibility Checks
Marcel Rumez, Karlsruhe University of Applied Sciences - Institute of Energy Efficient Mobility, Germany
Jürgen Dürrwang, Karlsruhe University of Applied Sciences - Institute of Energy Efficient Mobility, Germany
Johannes Braun, Karlsruhe University of Applied Sciences - Institute of Energy Efficient Mobility, Germany
Reiner Kriesten, Karlsruhe University of Applied Sciences - Institute of Energy Efficient Mobility, Germany

pages: 60 - 79
Empirical Case Studies of the Root Cause Analysis Method in Information Security
Niclas Hellesen, Norwegian University of Science and Technology, Norway
Henrik Miguel Nacarino Torres, Norwegian University of Science and Technology, Norway
Gaute Wangen, Norwegian University of Science and Technology, Norway

pages: 80 - 90
Optimal Security Protection for Sensitive Data
George O. M. Yee, Aptusinnova Inc. and Carleton University, Canada

pages: 91 - 103
RMDM – Further Verification of the Conceptual ICT Risk-Meta-Data-Model - Verified with the underlying Risk Models of COBIT for Risk and COSO ERM 2017
Martin Latzenhofer, Austrian Institute of Technology, University of Vienna, Austria
Gerald Quirchmayr, University of Vienna, Austria

pages: 104 - 117
A Survey on Open Forensics in Embedded Systems of Systems - From Automotive Considerations to a Larger Scope
Robert Altschaffel, Otto-von-Guericke-University, Germany
Kevin Lamshöft, Otto-von-Guericke-University, Germany
Stefan Kiltz, Otto-von-Guericke-University, Germany
Mario Hildebrandt, Otto-von-Guericke-University, Germany
Jana Dittmann, Otto-von-Guericke-University, Germany

pages: 118 - 126
Proposal and Study on Implementation of Data Eavesdropping Protection Method over Multipath TCP Communication Using Data Scrambling and Path Dispersion
Toshihiko Kato, University of Electro-Communications, Japan
Shihan Cheng, University of Electro-Communications, Japan
Ryo Yamamoto, University of Electro-Communications, Japan
Satoshi Ohzahata, University of Electro-Communications, Japan
Nobuo Suzuki, Adaptive Communications Research Laboratories, Japan

pages: 127 - 137
Empirical Analysis of Domain Blacklists
Tran Phuong Thao, KDDI Research, Inc., Japan
Akira Yamada, KDDI Research, Inc., Japan
Ayumu Kubota, KDDI Research, Inc., Japan

pages: 138 - 148
Simulating Blast Effects on High Security Vehicles with 3D Fluid-Structure Interaction
Arash Ramezani, University of the Federal Armed Forces Hamburg, Germany
Burghard Hillig, University of the Federal Armed Forces Hamburg, Germany
Hendrik Rothe, University of the Federal Armed Forces Hamburg, Germany

pages: 149 - 159
Advanced Sound Static Analysis to Detect Safety- and Security-Relevant Programming Defects
Daniel Kästner, AbsInt GmbH, Germany
Laurent Mauborgne, AbsInt GmbH, Germany
Nicolas Grafe, AbsInt GmbH, Germany
Christian Ferdinand, AbsInt GmbH, Germany

pages: 160 - 169
Integrating Autonomous Vehicle Safety and Security Analysis Using STPA Method and the Six-Step Model
Giedre Sabaliauskaite, Singapore University of Technology and Design, Singapore
Lin Shen Liew, Singapore University of Technology and Design, Singapore
Jin Cui, Singapore University of Technology and Design, Singapore

pages: 170 - 179
System Integrity Monitoring for Industrial Cyber Physical Systems
Rainer Falk, Siemens AG, Corporate Technology, Germany
Steffen Fries, Siemens AG, Corporate Technology, Germany

pages: 180 - 190
A Block Cipher Masking Technique for Single and Multi-Paired-User Environments
Ray Hashemi, Georgia Southern University, USA
Amar Rasheed, Georgia Southern University, USA
Azita Bahrami, IT Consultation, USA
Jeffrey Young, Georgia Southern University, USA

download vol 11, no 1&2, year 2018

 
Copyright (c) 2008-2010. IARIA, All rights reserved.