Pub Date : 2017-10-31DOI: 10.14257/ijsia.2017.11.10.05
M. Babar, Shahid Azeem, F. Arif
For the last few decades, security in software has gained too much attention by the industries. Developing secure software needs to emphasis on the functional and non-functional requirements both. Functional requirements are taken into account during the early stages of development while unfortunately the non-functional requirements are either ignored or less considered which results in the high cost of maintenance after delivery of the software. This article presents a detailed and comprehensive survey with regard to the integration of security non-functional requirements into architectural design. This paper thoroughly analyzes the existing approaches which are dealing the non-functional requirements at architecture level. The architectural design can be integrated with general non-functional requirements, but the scope of this particular article is only the security related non-functional requirements. The approaches which are comprehensively described and analyzed are use case/misuse cases, goal-based analysis, scenario-based, reused-based, pattern-based, and aspect-based. We have evaluated each approach by some parameters which are described based on the existing literature and comparison has been made between the current approaches thorough proper evaluation.
{"title":"Integration of Security Non-Functional Requirements and Architectural Design: A Comparative Analysis","authors":"M. Babar, Shahid Azeem, F. Arif","doi":"10.14257/ijsia.2017.11.10.05","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.10.05","url":null,"abstract":"For the last few decades, security in software has gained too much attention by the industries. Developing secure software needs to emphasis on the functional and non-functional requirements both. Functional requirements are taken into account during the early stages of development while unfortunately the non-functional requirements are either ignored or less considered which results in the high cost of maintenance after delivery of the software. This article presents a detailed and comprehensive survey with regard to the integration of security non-functional requirements into architectural design. This paper thoroughly analyzes the existing approaches which are dealing the non-functional requirements at architecture level. The architectural design can be integrated with general non-functional requirements, but the scope of this particular article is only the security related non-functional requirements. The approaches which are comprehensively described and analyzed are use case/misuse cases, goal-based analysis, scenario-based, reused-based, pattern-based, and aspect-based. We have evaluated each approach by some parameters which are described based on the existing literature and comparison has been made between the current approaches thorough proper evaluation.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49134228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To satisfy the security requirements of patients’ privacy and data’s security for health Internet of Things (IoT), various authentication schemes are proposed as guaranteed countermeasures. In particular, Wang et al. built an identity-based authentication scheme with extended Chebyshev chaotic maps. Nevertheless, considering service misuse attack and Denial-of-Service attack, Wang et al.’s method works inadequately. Also it is insufficient to provide efficient password change phase, fast error detection and session key agreement. As a remedy, we propose a novel dynamic identity authenticated key agreement scheme. Our scheme achieves resistance to the known attacks in order to meet the desirable security requirements. Furthermore, the presented scheme practically enables both user revocation/re-registration and biometric information protection, which are significant features ignored by most previous schemes. We confirm the effectiveness of our scheme via comprehensive comparisons in terms of resistance, functionality and performance.
{"title":"Design of a Secure Dynamic Identity Authentication Scheme for Health Internet of Things","authors":"Chengqi Wang, Xiao Zhang, Lijia Xie, Zhiming Zheng","doi":"10.14257/IJSIA.2017.11.9.04","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.9.04","url":null,"abstract":"To satisfy the security requirements of patients’ privacy and data’s security for health Internet of Things (IoT), various authentication schemes are proposed as guaranteed countermeasures. In particular, Wang et al. built an identity-based authentication scheme with extended Chebyshev chaotic maps. Nevertheless, considering service misuse attack and Denial-of-Service attack, Wang et al.’s method works inadequately. Also it is insufficient to provide efficient password change phase, fast error detection and session key agreement. As a remedy, we propose a novel dynamic identity authenticated key agreement scheme. Our scheme achieves resistance to the known attacks in order to meet the desirable security requirements. Furthermore, the presented scheme practically enables both user revocation/re-registration and biometric information protection, which are significant features ignored by most previous schemes. We confirm the effectiveness of our scheme via comprehensive comparisons in terms of resistance, functionality and performance.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42969424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-30DOI: 10.14257/IJSIA.2017.11.9.05
Vidhya Sathish, P. Khader
The blooming of intrusion instance trace notified as grim threat as per internet industry is concerned. To overcome, detection methodologies are designed by adopting an extensive intense research in the internet industry. Based on the consideration of challenging task and performance existence of contemporary computational methodologies, the objective of this Proposed Research has developed the enhanced hybrid strategy by combining the Support Vector Machine approach from classifier-based techniques and the Grey Wolf Optimizer from evolutionary techniques to optimize the support vector machine parameter towards the accurate classification of Host based intrusions with high detection accuracy and minimal false leads.
{"title":"Improved Detecting Host Based Intrusions Based On Hybrid SVM Using Grey Wolf Optimizer","authors":"Vidhya Sathish, P. Khader","doi":"10.14257/IJSIA.2017.11.9.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.9.05","url":null,"abstract":"The blooming of intrusion instance trace notified as grim threat as per internet industry is concerned. To overcome, detection methodologies are designed by adopting an extensive intense research in the internet industry. Based on the consideration of challenging task and performance existence of contemporary computational methodologies, the objective of this Proposed Research has developed the enhanced hybrid strategy by combining the Support Vector Machine approach from classifier-based techniques and the Grey Wolf Optimizer from evolutionary techniques to optimize the support vector machine parameter towards the accurate classification of Host based intrusions with high detection accuracy and minimal false leads.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49368506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-30DOI: 10.14257/ijsia.2017.11.9.02
A. Mansour, M. Fouad
This paper proposes a novel hybrid encryption algorithm that utilizes the natural language phonetics significantly. The encryption process is based on two major aspects. The first is the phonetic difference between languages and their mapping into Human Machine interface tools such as the computer keyboard. The second aspect is the embedded ciphering process as a mean of private key exchange (PKE). Such a key will be used to determine all the ciphering parameters. The presented encryption protocol is an end-to-end process and the choices of languages and machine interface is completely user dependant. The creation of ciphering parameters such as the indicator, the key, the array and the operation are also user defined. This work explores several examples for each choice using the Arabic language as a model for the phonetic intermediate language. The keyboard character mapping is used based on the location of characters in the multilingual keyboard. Both fixed location mapping and variable location shifting are introduced.
{"title":"Cryptography Protocol: A Novel Multilingual Adaptive Encryption Technique with Phonetic Based Ciphering","authors":"A. Mansour, M. Fouad","doi":"10.14257/ijsia.2017.11.9.02","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.9.02","url":null,"abstract":"This paper proposes a novel hybrid encryption algorithm that utilizes the natural language phonetics significantly. The encryption process is based on two major aspects. The first is the phonetic difference between languages and their mapping into Human Machine interface tools such as the computer keyboard. The second aspect is the embedded ciphering process as a mean of private key exchange (PKE). Such a key will be used to determine all the ciphering parameters. The presented encryption protocol is an end-to-end process and the choices of languages and machine interface is completely user dependant. The creation of ciphering parameters such as the indicator, the key, the array and the operation are also user defined. This work explores several examples for each choice using the Arabic language as a model for the phonetic intermediate language. The keyboard character mapping is used based on the location of characters in the multilingual keyboard. Both fixed location mapping and variable location shifting are introduced.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48288168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-30DOI: 10.14257/ijsia.2017.11.9.01
A. Siahaan
Steganography has no protection to make the information hidden is safe from theft. This technique only tries to store information in the image purely. There are many ways to steal information from pixels stored in RGB colors. Bit-Plane Complexity Segmentation (BPCS) is one of the steganography technique is often performed to conceal data. But in BPCS method, a used pattern is not a classified anymore. It breaks down and changes the plain text structure into square information. BPCS has two types of area, informative and noise-like region. This division depends on the threshold value. The noise-like region is the only area that can store confidential information. It is an 8 x 8 matrix pattern. The plain text is turned into bits and finally kept in the matrix. Converting the bit-plane information is a technique for increasing the security of the vessel image. Vernam cipher can easily be occupied to modify the bit-plane structure with the predetermined blocks conjugation. The cipher block contains a new set of unbreakable characters. It increases the security level.
{"title":"Vernam Conjugated Manipulation of Bit-plane Complexity Segmentation","authors":"A. Siahaan","doi":"10.14257/ijsia.2017.11.9.01","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.9.01","url":null,"abstract":"Steganography has no protection to make the information hidden is safe from theft. This technique only tries to store information in the image purely. There are many ways to steal information from pixels stored in RGB colors. Bit-Plane Complexity Segmentation (BPCS) is one of the steganography technique is often performed to conceal data. But in BPCS method, a used pattern is not a classified anymore. It breaks down and changes the plain text structure into square information. BPCS has two types of area, informative and noise-like region. This division depends on the threshold value. The noise-like region is the only area that can store confidential information. It is an 8 x 8 matrix pattern. The plain text is turned into bits and finally kept in the matrix. Converting the bit-plane information is a technique for increasing the security of the vessel image. Vernam cipher can easily be occupied to modify the bit-plane structure with the predetermined blocks conjugation. The cipher block contains a new set of unbreakable characters. It increases the security level.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45279862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-30DOI: 10.14257/ijsia.2017.11.9.06
Sepideh Bahri-Laleh, M. Balafar, M. Feizi-Derakhshi
This paper introduces a novel approach based on a stream cipher to encrypt RGB images. In this regard, a Particle Swarm Optimization (PSO) based algorithm is used to generate the keystream for encryption. Red, green and blue channels of the RGB image are shown as texts and then a stream cipher is used to encrypt the resultant image. A method named PSO Key Generation Color image Encryption (PKGCE) algorithm uses 3 character code tables for each of the 3 channels of RGB image in order to encode the keys and the plain texts showing correspondent channel of the RGB image. A zigzag operation is done on the resultant image in each of the channels to provide more security in a way that the start point of the zigzag path is dependent on the key and channel size. The main advantages of this algorithm over the previously ones, are less number of keys needed to be stored and distributed and also the appropriate speed of the algorithm. Experimental results and the comparison of the proposed algorithm with other encryption algorithms are discussed in detail.
{"title":"A stream cipher method for RGB image encryption using PSO base key generation","authors":"Sepideh Bahri-Laleh, M. Balafar, M. Feizi-Derakhshi","doi":"10.14257/ijsia.2017.11.9.06","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.9.06","url":null,"abstract":"This paper introduces a novel approach based on a stream cipher to encrypt RGB images. In this regard, a Particle Swarm Optimization (PSO) based algorithm is used to generate the keystream for encryption. Red, green and blue channels of the RGB image are shown as texts and then a stream cipher is used to encrypt the resultant image. A method named PSO Key Generation Color image Encryption (PKGCE) algorithm uses 3 character code tables for each of the 3 channels of RGB image in order to encode the keys and the plain texts showing correspondent channel of the RGB image. A zigzag operation is done on the resultant image in each of the channels to provide more security in a way that the start point of the zigzag path is dependent on the key and channel size. The main advantages of this algorithm over the previously ones, are less number of keys needed to be stored and distributed and also the appropriate speed of the algorithm. Experimental results and the comparison of the proposed algorithm with other encryption algorithms are discussed in detail.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2017.11.9.06","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42974763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-30DOI: 10.14257/IJSIA.2017.11.9.03
Shin-Yan Chiou, Chia-Chun Lin
While the Internet allows licensees to easily disseminate digital content, it also facilitates misappropriation of such content along with violations of personal privacy. Digital rights management (DRM) measures were developed to address such problems. However, DRM can only be used to verify data correctness from software, but cannot be used to verify software soundness from data. In addition, although trusted platform modules (TPM) can be used to achieve system security, such measures to not provide DRM protection. We thus propose a version request system not only achieves DRM functions, but can also conduct version requests for software from data. In this system’s version checking restrictions, only a secure operation system and application can store the cryptography component’s secret key, which is then used to protect and manage the right object (RO).
{"title":"A Monitor System for Software Version Request in Offline Environments","authors":"Shin-Yan Chiou, Chia-Chun Lin","doi":"10.14257/IJSIA.2017.11.9.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.9.03","url":null,"abstract":"While the Internet allows licensees to easily disseminate digital content, it also facilitates misappropriation of such content along with violations of personal privacy. Digital rights management (DRM) measures were developed to address such problems. However, DRM can only be used to verify data correctness from software, but cannot be used to verify software soundness from data. In addition, although trusted platform modules (TPM) can be used to achieve system security, such measures to not provide DRM protection. We thus propose a version request system not only achieves DRM functions, but can also conduct version requests for software from data. In this system’s version checking restrictions, only a secure operation system and application can store the cryptography component’s secret key, which is then used to protect and manage the right object (RO).","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48271739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-30DOI: 10.14257/IJSIA.2017.11.9.07
Aastha Yadav, Sarthak Raisurana, H. Balaji, P. Lalitha, Ronnie D. Caytiles, N. Iyengar
Healthcare Organizations have seen an alarming rise in cyber-attacks in the recent years. One way a hacker could get control was by breaking into a medical network to gain access over the active medical devices that patients rely on for their survival. Our network model proposes a low-interaction and a medium-interaction honeypot based intrusion detection system using Dionaea and Kippo SSH to secure our internal network and study the activities of the intruders. We also look at a possible Metasploit attack and Brute force attack logged by Dionaea and Kippo SSH which prepares the Malware Analysis report of the suspicious file downloaded.
{"title":"Information Security in Healthcare Organizations using Low-Interaction Honeypot Intrusion Detection System","authors":"Aastha Yadav, Sarthak Raisurana, H. Balaji, P. Lalitha, Ronnie D. Caytiles, N. Iyengar","doi":"10.14257/IJSIA.2017.11.9.07","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.9.07","url":null,"abstract":"Healthcare Organizations have seen an alarming rise in cyber-attacks in the recent years. One way a hacker could get control was by breaking into a medical network to gain access over the active medical devices that patients rely on for their survival. Our network model proposes a low-interaction and a medium-interaction honeypot based intrusion detection system using Dionaea and Kippo SSH to secure our internal network and study the activities of the intruders. We also look at a possible Metasploit attack and Brute force attack logged by Dionaea and Kippo SSH which prepares the Malware Analysis report of the suspicious file downloaded.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44886736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-31DOI: 10.14257/ijsia.2017.11.8.04
B. T. Hammad, N. Jamil, M. Rusli, M. Z’aba
In this paper, a new sponge construction called DLP-Sponge is proposed, which takes an arbitrary length of input and yields an output of random length. We prove that this construction is resistant against generic attacks such as multicollision attacks with a better complexity 2 2(c+3)/2 even when a small capacity is used, i.e. lightweight cryptography, where c is the capacity. Furthermore, it is used in building other cryptographic primitives such as block cipher, cryptographic hash functions and Message Authentication Codes (MACs).
{"title":"Double Length Sponge Construction DLP-Sponge","authors":"B. T. Hammad, N. Jamil, M. Rusli, M. Z’aba","doi":"10.14257/ijsia.2017.11.8.04","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.8.04","url":null,"abstract":"In this paper, a new sponge construction called DLP-Sponge is proposed, which takes an arbitrary length of input and yields an output of random length. We prove that this construction is resistant against generic attacks such as multicollision attacks with a better complexity 2 2(c+3)/2 even when a small capacity is used, i.e. lightweight cryptography, where c is the capacity. Furthermore, it is used in building other cryptographic primitives such as block cipher, cryptographic hash functions and Message Authentication Codes (MACs).","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45587862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-31DOI: 10.14257/IJSIA.2017.11.8.02
Sarvesh Tanwar, Anil Kumar
The most important security services of Public Key Infrastructure (PKI) such as e authentication, integrity, confidentiality and non- repudiation enables its clients to maintain a level of trust. It enables clients to exchange information over unsecure public network such as Internet. PKI proves the identity of an individual or an organization via digital certificates which binds information of client and public key. Public keys are store in public key directory. A PKI system works by having a Certificate Authority (CA) that is responsible for issuing and revoking certificates. Certificates are basic source of trust in online transactions. The aim of this paper is to design and implement a CA that can create and manage public key certificates. We have proposed a trusted hierarchical trust model which is extension of work done by Janabi et al.. [4]. The proposed system is designed and implemented using JAVA programming language, MYSQL database server and Apache web server.
{"title":"Extended Design and Implementation of Certificate Authorities","authors":"Sarvesh Tanwar, Anil Kumar","doi":"10.14257/IJSIA.2017.11.8.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.8.02","url":null,"abstract":"The most important security services of Public Key Infrastructure (PKI) such as e authentication, integrity, confidentiality and non- repudiation enables its clients to maintain a level of trust. It enables clients to exchange information over unsecure public network such as Internet. PKI proves the identity of an individual or an organization via digital certificates which binds information of client and public key. Public keys are store in public key directory. A PKI system works by having a Certificate Authority (CA) that is responsible for issuing and revoking certificates. Certificates are basic source of trust in online transactions. The aim of this paper is to design and implement a CA that can create and manage public key certificates. We have proposed a trusted hierarchical trust model which is extension of work done by Janabi et al.. [4]. The proposed system is designed and implemented using JAVA programming language, MYSQL database server and Apache web server.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45572716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}