Anurag Singh Tomar, Sumit Kumar, S. K. Chaurasiya, Vanshika Shrivastava
{"title":"Novel Approach for E-passport Authentication using Elgamal Cryptosystem","authors":"Anurag Singh Tomar, Sumit Kumar, S. K. Chaurasiya, Vanshika Shrivastava","doi":"10.14257/IJSIA.2018.12.2.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"19-28"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43828571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Query-Dependency-Aware Location Privacy Protection for Road Networks","authors":"Huiyun Chen, X. Qin","doi":"10.14257/ijsia.2018.12.2.04","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.2.04","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"29-44"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46767341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fiza Abdul Rahim, Gopinath Muruti, Z. Ismail, Ganthan Narayana Samy
{"title":"A qualitative analysis of information privacy concerns among healthcare employees.","authors":"Fiza Abdul Rahim, Gopinath Muruti, Z. Ismail, Ganthan Narayana Samy","doi":"10.14257/IJSIA.2018.12.1.06","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.1.06","url":null,"abstract":"Healthcare organizationsprocess massive amount of electronic medical records (EMR) utilizedby their employees. Having given privileged access to sensitive and valuable patient information in the EMR, healthcare employees may cause privacy breaches, which may lead to detrimental consequences. Therefore, it is vital to impose particular attention to healthcare employees’ concerns on privacy in the use of EMR. The purpose of this paper is to indicate the results from quantitative analysis (phase 1) through qualitative analysis (phase 2). From phase 1, privacy awareness is the only factor that influences information privacy concerns (IPC) in the use of EMRamong healthcare employees, suggesting that healthcare employees do not think that privacy policy, privacy control, privacy risk, and privacy experience influence their IPC. To investigate why the respondents answered in this manner, the interviewees were asked to clarify why they think privacy awareness is veryimportant to ensure the IPC among healthcare employees. Indeed, the mediating relationship of privacy awareness between privacy policy and IPC were discussed by highlighting on the implementation practices regarding privacy policy enforcement and awareness programs in healthcare organization.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"69-78"},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48623959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cover Selection for More Secure Steganography","authors":"Reza Esfahani, Z. Norozi, G. Jandaghi","doi":"10.14257/IJSIA.2018.12.1.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.1.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"21-36"},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46327803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Khan, F. Khan, Farheen Qazi, Dur-e-Shawar Agha, B. Das
{"title":"Secure Identity-Based Cryptographic Approach for Vehicular Ah-hoc Networks","authors":"S. Khan, F. Khan, Farheen Qazi, Dur-e-Shawar Agha, B. Das","doi":"10.14257/IJSIA.2018.12.1.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.1.05","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"59-68"},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47000704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficiency of Two Versions of SNOW against Guess & Determine Attack","authors":"M. Tahir, G. Mujtaba, Saood Zia, T. Naz","doi":"10.14257/ijsia.2018.12.1.04","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.1.04","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"47-58"},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47147350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigation Strategies for Unintentional Insider Threats on Information Leaks","authors":"W. Ismail, M. Yusof","doi":"10.14257/IJSIA.2018.12.1.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.1.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"37-46"},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47769717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Defense Budget Assessment in Smart Grid Based on Reliability Evaluation Considering Practical Data of HV Substation","authors":"N. Fardad, S. Soleymani, F. Faghihi","doi":"10.14257/IJSIA.2018.12.1.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.1.01","url":null,"abstract":"Communication and control in the smart grid without any disturbance is the primary task of High Voltage (HV) substation. The nature of electrical network obliges constructing and operating the functions of substations in remote areas far from urban centers. This can cause increasing of concerns about their security. Thus, HV substation designers have focused on defensive algorithms for decreasing these concerns. This paper deals with four cyber defense approaches, including hardware, software, communication shielded cable, and optimized cable route. The defense budget has been estimated via Fuzzy Analytic Hierarchy Process (FAHP) as a function of hardware, software, and communication shielded cable and optimized cable route. Knowledge and experience of experts help to extract mathematical relations between these four approaches. These relations are the base of optimization of attack and defense budget. In the proposed algorithm, \"loss of load expectation (LOLE)\" as a reliability index is utilized to optimize cyber defense budget of each part of studying network (one supervisory control and data acquisition (SCADA) center and nine HV substations). By comparing the LOLE with a permitted design threshold value, optimal budget of each item is determined. The accuracy of proposed methods has been validated by implementing to a case study real network.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"1-20"},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2018.12.1.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44849068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Giao N. Pham, Suk-Hwan Lee, Eung-Joo Lee, Ki-Ryong Kwon
{"title":"Menger Curvature Based 3D Printing Watermarking Algorithm","authors":"Giao N. Pham, Suk-Hwan Lee, Eung-Joo Lee, Ki-Ryong Kwon","doi":"10.14257/ijsia.2017.11.12.06","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.12.06","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"65-78"},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44804434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and Trust in Cloud Computing: A Survey","authors":"Fatmeh Sedaghat, M. Haghparast, Mehrdad Maeen","doi":"10.14257/IJSIA.2017.11.12.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.12.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"1-14"},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41694352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}