首页 > 最新文献

International Journal of Security and Its Applications最新文献

英文 中文
Novel Approach for E-passport Authentication using Elgamal Cryptosystem 基于Elgamal密码系统的电子护照认证新方法
Pub Date : 2018-03-31 DOI: 10.14257/IJSIA.2018.12.2.03
Anurag Singh Tomar, Sumit Kumar, S. K. Chaurasiya, Vanshika Shrivastava
{"title":"Novel Approach for E-passport Authentication using Elgamal Cryptosystem","authors":"Anurag Singh Tomar, Sumit Kumar, S. K. Chaurasiya, Vanshika Shrivastava","doi":"10.14257/IJSIA.2018.12.2.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"19-28"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43828571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Query-Dependency-Aware Location Privacy Protection for Road Networks 基于查询相关性的道路网络位置隐私保护
Pub Date : 2018-03-31 DOI: 10.14257/ijsia.2018.12.2.04
Huiyun Chen, X. Qin
{"title":"Query-Dependency-Aware Location Privacy Protection for Road Networks","authors":"Huiyun Chen, X. Qin","doi":"10.14257/ijsia.2018.12.2.04","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.2.04","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"29-44"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46767341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A qualitative analysis of information privacy concerns among healthcare employees. 医疗保健员工信息隐私问题的定性分析。
Pub Date : 2018-01-31 DOI: 10.14257/IJSIA.2018.12.1.06
Fiza Abdul Rahim, Gopinath Muruti, Z. Ismail, Ganthan Narayana Samy
Healthcare organizationsprocess massive amount of electronic medical records (EMR) utilizedby their employees. Having given privileged access to sensitive and valuable patient information in the EMR, healthcare employees may cause privacy breaches, which may lead to detrimental consequences. Therefore, it is vital to impose particular attention to healthcare employees’ concerns on privacy in the use of EMR. The purpose of this paper is to indicate the results from quantitative analysis (phase 1) through qualitative analysis (phase 2). From phase 1, privacy awareness is the only factor that influences information privacy concerns (IPC) in the use of EMRamong healthcare employees, suggesting that healthcare employees do not think that privacy policy, privacy control, privacy risk, and privacy experience influence their IPC. To investigate why the respondents answered in this manner, the interviewees were asked to clarify why they think privacy awareness is veryimportant to ensure the IPC among healthcare employees. Indeed, the mediating relationship of privacy awareness between privacy policy and IPC were discussed by highlighting on the implementation practices regarding privacy policy enforcement and awareness programs in healthcare organization.
医疗保健组织需要处理员工使用的大量电子医疗记录(EMR)。医疗保健员工获得了访问EMR中敏感和有价值的患者信息的特权,可能会造成隐私泄露,从而导致有害后果。因此,必须特别关注医疗保健员工在使用电子病历时对隐私的关注。本文的目的是通过定性分析(第二阶段)来说明定量分析(第一阶段)的结果。从第一阶段来看,隐私意识是医疗保健员工在使用电子病历时影响信息隐私关注(IPC)的唯一因素,这表明医疗保健员工并不认为隐私政策、隐私控制、隐私风险和隐私体验会影响他们的IPC。为了调查为什么受访者以这种方式回答,受访者被要求澄清为什么他们认为隐私意识对于确保医疗保健员工的IPC非常重要。实际上,通过强调医疗机构中隐私政策执行和意识项目的实施实践,讨论了隐私政策和IPC之间隐私意识的中介关系。
{"title":"A qualitative analysis of information privacy concerns among healthcare employees.","authors":"Fiza Abdul Rahim, Gopinath Muruti, Z. Ismail, Ganthan Narayana Samy","doi":"10.14257/IJSIA.2018.12.1.06","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.1.06","url":null,"abstract":"Healthcare organizationsprocess massive amount of electronic medical records (EMR) utilizedby their employees. Having given privileged access to sensitive and valuable patient information in the EMR, healthcare employees may cause privacy breaches, which may lead to detrimental consequences. Therefore, it is vital to impose particular attention to healthcare employees’ concerns on privacy in the use of EMR. The purpose of this paper is to indicate the results from quantitative analysis (phase 1) through qualitative analysis (phase 2). From phase 1, privacy awareness is the only factor that influences information privacy concerns (IPC) in the use of EMRamong healthcare employees, suggesting that healthcare employees do not think that privacy policy, privacy control, privacy risk, and privacy experience influence their IPC. To investigate why the respondents answered in this manner, the interviewees were asked to clarify why they think privacy awareness is veryimportant to ensure the IPC among healthcare employees. Indeed, the mediating relationship of privacy awareness between privacy policy and IPC were discussed by highlighting on the implementation practices regarding privacy policy enforcement and awareness programs in healthcare organization.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"69-78"},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48623959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cover Selection for More Secure Steganography 封面选择更安全的隐写
Pub Date : 2018-01-31 DOI: 10.14257/IJSIA.2018.12.1.02
Reza Esfahani, Z. Norozi, G. Jandaghi
{"title":"Cover Selection for More Secure Steganography","authors":"Reza Esfahani, Z. Norozi, G. Jandaghi","doi":"10.14257/IJSIA.2018.12.1.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.1.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"21-36"},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46327803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Identity-Based Cryptographic Approach for Vehicular Ah-hoc Networks 车载Ah-hoc网络的安全身份加密方法
Pub Date : 2018-01-31 DOI: 10.14257/IJSIA.2018.12.1.05
S. Khan, F. Khan, Farheen Qazi, Dur-e-Shawar Agha, B. Das
{"title":"Secure Identity-Based Cryptographic Approach for Vehicular Ah-hoc Networks","authors":"S. Khan, F. Khan, Farheen Qazi, Dur-e-Shawar Agha, B. Das","doi":"10.14257/IJSIA.2018.12.1.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.1.05","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"59-68"},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47000704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficiency of Two Versions of SNOW against Guess & Determine Attack 两种版本的SNOW对猜测和确定攻击的有效性
Pub Date : 2018-01-31 DOI: 10.14257/ijsia.2018.12.1.04
M. Tahir, G. Mujtaba, Saood Zia, T. Naz
{"title":"Efficiency of Two Versions of SNOW against Guess & Determine Attack","authors":"M. Tahir, G. Mujtaba, Saood Zia, T. Naz","doi":"10.14257/ijsia.2018.12.1.04","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.1.04","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"47-58"},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47147350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mitigation Strategies for Unintentional Insider Threats on Information Leaks 信息泄露意外内部威胁的缓解策略
Pub Date : 2018-01-31 DOI: 10.14257/IJSIA.2018.12.1.03
W. Ismail, M. Yusof
{"title":"Mitigation Strategies for Unintentional Insider Threats on Information Leaks","authors":"W. Ismail, M. Yusof","doi":"10.14257/IJSIA.2018.12.1.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.1.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"37-46"},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47769717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cyber Defense Budget Assessment in Smart Grid Based on Reliability Evaluation Considering Practical Data of HV Substation 基于高压变电站实际数据可靠性评估的智能电网网络防御预算评估
Pub Date : 2018-01-31 DOI: 10.14257/IJSIA.2018.12.1.01
N. Fardad, S. Soleymani, F. Faghihi
Communication and control in the smart grid without any disturbance is the primary task of High Voltage (HV) substation. The nature of electrical network obliges constructing and operating the functions of substations in remote areas far from urban centers. This can cause increasing of concerns about their security. Thus, HV substation designers have focused on defensive algorithms for decreasing these concerns. This paper deals with four cyber defense approaches, including hardware, software, communication shielded cable, and optimized cable route. The defense budget has been estimated via Fuzzy Analytic Hierarchy Process (FAHP) as a function of hardware, software, and communication shielded cable and optimized cable route. Knowledge and experience of experts help to extract mathematical relations between these four approaches. These relations are the base of optimization of attack and defense budget. In the proposed algorithm, "loss of load expectation (LOLE)" as a reliability index is utilized to optimize cyber defense budget of each part of studying network (one supervisory control and data acquisition (SCADA) center and nine HV substations). By comparing the LOLE with a permitted design threshold value, optimal budget of each item is determined. The accuracy of proposed methods has been validated by implementing to a case study real network.
在智能电网中实现无干扰的通信和控制是高压变电站的首要任务。电网的性质决定了在远离城市中心的偏远地区建设和运行变电站的功能。这可能会引起人们对其安全性的日益关注。因此,高压变电站的设计人员专注于减少这些问题的防御算法。本文讨论了四种网络防御方法,包括硬件、软件、通信屏蔽电缆和优化电缆路由。国防预算通过模糊层次分析法(FAHP)作为硬件、软件、通信屏蔽电缆和优化电缆路由的函数进行估计。专家的知识和经验有助于提取这四种方法之间的数学关系。这些关系是攻防预算优化的基础。该算法以“负荷预期损失(LOLE)”为可靠性指标,对研究网络各部分(1个SCADA中心和9个高压变电站)的网络防御预算进行优化。通过将LOLE与允许的设计阈值进行比较,确定各项目的最优预算。通过实例分析,验证了所提方法的准确性。
{"title":"Cyber Defense Budget Assessment in Smart Grid Based on Reliability Evaluation Considering Practical Data of HV Substation","authors":"N. Fardad, S. Soleymani, F. Faghihi","doi":"10.14257/IJSIA.2018.12.1.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.1.01","url":null,"abstract":"Communication and control in the smart grid without any disturbance is the primary task of High Voltage (HV) substation. The nature of electrical network obliges constructing and operating the functions of substations in remote areas far from urban centers. This can cause increasing of concerns about their security. Thus, HV substation designers have focused on defensive algorithms for decreasing these concerns. This paper deals with four cyber defense approaches, including hardware, software, communication shielded cable, and optimized cable route. The defense budget has been estimated via Fuzzy Analytic Hierarchy Process (FAHP) as a function of hardware, software, and communication shielded cable and optimized cable route. Knowledge and experience of experts help to extract mathematical relations between these four approaches. These relations are the base of optimization of attack and defense budget. In the proposed algorithm, \"loss of load expectation (LOLE)\" as a reliability index is utilized to optimize cyber defense budget of each part of studying network (one supervisory control and data acquisition (SCADA) center and nine HV substations). By comparing the LOLE with a permitted design threshold value, optimal budget of each item is determined. The accuracy of proposed methods has been validated by implementing to a case study real network.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"1-20"},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2018.12.1.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44849068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Menger Curvature Based 3D Printing Watermarking Algorithm 基于门格尔曲率的3D打印水印算法
Pub Date : 2017-12-31 DOI: 10.14257/ijsia.2017.11.12.06
Giao N. Pham, Suk-Hwan Lee, Eung-Joo Lee, Ki-Ryong Kwon
{"title":"Menger Curvature Based 3D Printing Watermarking Algorithm","authors":"Giao N. Pham, Suk-Hwan Lee, Eung-Joo Lee, Ki-Ryong Kwon","doi":"10.14257/ijsia.2017.11.12.06","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.12.06","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"65-78"},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44804434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Trust in Cloud Computing: A Survey 云计算中的安全与信任:综述
Pub Date : 2017-12-31 DOI: 10.14257/IJSIA.2017.11.12.01
Fatmeh Sedaghat, M. Haghparast, Mehrdad Maeen
{"title":"Security and Trust in Cloud Computing: A Survey","authors":"Fatmeh Sedaghat, M. Haghparast, Mehrdad Maeen","doi":"10.14257/IJSIA.2017.11.12.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.12.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"1-14"},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41694352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Security and Its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1