Information Assurance and Security J.UCS Special Issue

نویسندگان

  • Ajith Abraham
  • Sugata Sanyal
  • Lakhmi Jain
چکیده

The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centres and military installations to name a few. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals. The First International Symposium on Information Assurance and Security (IAS'04) which was organized in conjunction with the 2004 IEEE International Conference on Information Technology Coding and Computing (ITCC'04) attracted information security experts representing various problem domains. This special issue comprising of 11 papers present some of the cutting edge research results on security issues such as authentication and authorization, data and system protection and integrity, steganography, security models, risk analysis, cryptography, secure e-commerce protocols, agent and mobile code security, wireless networks security, database security to computer forensics, information quality assurance, internet security and intrusion detection. Papers were selected on the basis of fundamental ideas/concepts rather than the thoroughness of techniques deployed. The papers are organized as follows. Wireless local area networks are increasingly popular as they are easy to deploy at low cost. Unfortunately, they are easily vulnerable to attacks since their signals can be detected by eavesdroppers at great distances. Wireless Intrusion Detection Systems (WIDS) provides a security framework by combining intrusion detection with physical location detection using directional antennas. Adelstein et al. in the first paper illustrate the performance of WIDS using inexpensive hardware. Digital forensics involves collection and analysis of digital data within an investigative process and the key challenge here is the collection of data in the least intrusive manner. In the second paper, Sitaraman and Venkatesan present a checkpoint methodology for a disk that has a Unix-like file system. The task is to record a checkpoint of a disk drive mounted as a file system on a host machine

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Recent Advances in Security and Privacy in Big Data J.UCS Special Issue

Big data has become an important topic in science, engineering, medicine, healthcare, finance, business and ultimately society itself. Big data refers to the massive amount of digital information stored or transmitted in computer systems. Approximately, 2.5 quintillion bytes of data are created every day. Almost 90% of data in the world today are created in the last two years alone. Security an...

متن کامل

Selected Papers from the 1st ACIS International Workshop on Self-Assembling Wireless Networks J.UCS Special Issue

The workshop provides a forum for the exchange of ideas and results among industry practitioners and researchers working on all aspects of self-assembling wireless networks, including, but not limited to: modeling and optimization of heterogeneous self-assembling wireless networks, authentication, privacy, and security, dynamic networks and dynamic graph algorithms, dynamic frequency and channe...

متن کامل

Quo Vadis Abstract State Machines? J.UCS Special Issue

In introducing this special ASM issue of J.UCS we point out the particular role this Journal played in the short history of the ASM method and add some reflections on its current status. 1 J.UCS and the ASM Method The Journal of Universal Computer Science has marked some important steps of the development of the Abstract State Machines (ASM) method for a rigorous design and the mathematical ana...

متن کامل

Editorial: Special issue on security of information and networks

All aspects of the modern life are related to processing, communicating, storing and retrieving of information in computer networks and systems. Security of information and networks is of vital importance and very highly relevant nowadays in view of rampant attacks on information systems, evolving BYOD practices in enterprises, and particularly due to drives towards cloud-based integration of e...

متن کامل

Professional Knowledge Management – Experiences and Visions J.UCS Special Issue

Professional knowledge management is a critical success factor in today’s enterprises. The efficacy of a knowledge management (KM) project depends heavily on a successful coordination of issues such as corporate culture, organizational processes, human resource management and information technology. It is currently not well understood how best to balance and align these issues. In order to faci...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004