Volume 3, Issue 2

 

ارسال های اخیر

  • Separating indexes from data: a distributed scheme for secure database outsourcing 

    Soltani, S.؛ Hadavi, M.؛ Jalili, R. (Iranian Society of Cryptology, 2011-07-01)
    Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should ...

  • A model for specification, composition and verification of access control policies and its application to web services 

    Derakhshandeh, Z.؛ Tork Ladani, B. (Iranian Society of Cryptology, 2011-07-01)
    Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies ...

  • Alert correlation and prediction using data mining and HMM 

    Farhadi, H.؛ AmirHaeri, M.؛ Khansari, M. (Iranian Society of Cryptology, 2011-07-01)
    Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs ...

  • Constructing cryptographic definitions 

    Rogaway, P. (Iranian Society of Cryptology, 2011-07-01)
    This paper mirrors an invited talk to ISCISC 2011. It is not a conventional paper so much as an essay summarizing thoughts on a little-talked-about subject. My goal is to intermix some introspection about definitions with ...

  • Editorial 

    Jalili, R. (Iranian Society of Cryptology, 2011-07-01)
    From the Editor-in-Chief