Information Assurance and Security J.UCS Special Issue
نویسندگان
چکیده
The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centres and military installations to name a few. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals. The First International Symposium on Information Assurance and Security (IAS'04) which was organized in conjunction with the 2004 IEEE International Conference on Information Technology Coding and Computing (ITCC'04) attracted information security experts representing various problem domains. This special issue comprising of 11 papers present some of the cutting edge research results on security issues such as authentication and authorization, data and system protection and integrity, steganography, security models, risk analysis, cryptography, secure e-commerce protocols, agent and mobile code security, wireless networks security, database security to computer forensics, information quality assurance, internet security and intrusion detection. Papers were selected on the basis of fundamental ideas/concepts rather than the thoroughness of techniques deployed. The papers are organized as follows. Wireless local area networks are increasingly popular as they are easy to deploy at low cost. Unfortunately, they are easily vulnerable to attacks since their signals can be detected by eavesdroppers at great distances. Wireless Intrusion Detection Systems (WIDS) provides a security framework by combining intrusion detection with physical location detection using directional antennas. Adelstein et al. in the first paper illustrate the performance of WIDS using inexpensive hardware. Digital forensics involves collection and analysis of digital data within an investigative process and the key challenge here is the collection of data in the least intrusive manner. In the second paper, Sitaraman and Venkatesan present a checkpoint methodology for a disk that has a Unix-like file system. The task is to record a checkpoint of a disk drive mounted as a file system on a host machine
منابع مشابه
Recent Advances in Security and Privacy in Big Data J.UCS Special Issue
Big data has become an important topic in science, engineering, medicine, healthcare, finance, business and ultimately society itself. Big data refers to the massive amount of digital information stored or transmitted in computer systems. Approximately, 2.5 quintillion bytes of data are created every day. Almost 90% of data in the world today are created in the last two years alone. Security an...
متن کاملSelected Papers from the 1st ACIS International Workshop on Self-Assembling Wireless Networks J.UCS Special Issue
The workshop provides a forum for the exchange of ideas and results among industry practitioners and researchers working on all aspects of self-assembling wireless networks, including, but not limited to: modeling and optimization of heterogeneous self-assembling wireless networks, authentication, privacy, and security, dynamic networks and dynamic graph algorithms, dynamic frequency and channe...
متن کاملQuo Vadis Abstract State Machines? J.UCS Special Issue
In introducing this special ASM issue of J.UCS we point out the particular role this Journal played in the short history of the ASM method and add some reflections on its current status. 1 J.UCS and the ASM Method The Journal of Universal Computer Science has marked some important steps of the development of the Abstract State Machines (ASM) method for a rigorous design and the mathematical ana...
متن کاملEditorial: Special issue on security of information and networks
All aspects of the modern life are related to processing, communicating, storing and retrieving of information in computer networks and systems. Security of information and networks is of vital importance and very highly relevant nowadays in view of rampant attacks on information systems, evolving BYOD practices in enterprises, and particularly due to drives towards cloud-based integration of e...
متن کاملProfessional Knowledge Management – Experiences and Visions J.UCS Special Issue
Professional knowledge management is a critical success factor in today’s enterprises. The efficacy of a knowledge management (KM) project depends heavily on a successful coordination of issues such as corporate culture, organizational processes, human resource management and information technology. It is currently not well understood how best to balance and align these issues. In order to faci...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004