Issue Information
Free Access

Issue Information

  • Pages: i-iii
  • First Published: 24 August 2014

Editorial
Free Access

Advances in trusted network computing

  • Pages: 1311-1312
  • First Published: 30 May 2014

Special Issue Paper
Free to Read

Smartphone security: understanding smartphone users' trust in information security management

  • Pages: 1313-1321
  • First Published: 11 July 2013
Smartphone security: understanding smartphone users' trust in information security management

The research aims to study the relationships between smartphone users' computer literacy, network literacy, knowledge on mobile phone viruses (MPV), and trust in information security management (ISM) principles (i.e., confidentiality, integrity, and availability). The study results indicate that smartphone users' network literacy positively influences their knowledge on MPV, whereas users' computer literacy is not significantly associated with their knowledge on MPV. Moreover, smartphone users' knowledge on MPV would significantly affect their trusts in three ISM principles.

Special Issue Paper
Free to Read

A trust model based on semantic distance for pervasive environments

  • Pages: 1322-1330
  • First Published: 09 May 2013
A trust model based on semantic distance for pervasive environments

A semantic distance-based trust model is proposed. The semantic distance between entities and between trust categories is borrowed to calculate trustworthiness more precisely. In the model, the behavior trust and capability trust are distinguished and evaluated separately. The simulation experiment results proved the effectiveness of the model in improving the interaction success ratio and efficiency between entities under pervasive environments.

Special Issue Paper
Free to Read

The approaches to contextual transaction trust computation in e-Commerce environments

  • Pages: 1331-1351
  • First Published: 12 February 2014
The approaches to contextual transaction trust computation in e-Commerce environments

In e-commerce environments, most existing trust evaluation studies compute a single trust value to reflect the “general” trust level of a seller without any information of transaction context taken into account. In this paper, we first propose a new context-aware trust evaluation model for outlining a seller's reputation profile. Then we further propose several approaches in order to deliver prompt responses to a buyer's queries on a seller's trust value in different transaction contexts.

Special Issue Paper
Free to Read

A game theoretic truthful reputation mechanism in mobile ad hoc networks

  • Pages: 1352-1363
  • First Published: 20 February 2014
A game theoretic truthful reputation mechanism in mobile ad hoc networks

This paper proposes a truthful and group strategyproof reputation mechanism based on cooperative game theory. After studying two supermodular total compensatory payment functions, we construct a corresponding indirect revelation mechanism and a direct revelation mechanism called claiming compensation mechanism, which is proved to be group strategyproof. Simulation results show that when using the total compensatory payments function, which does not relate to cost values, the proposed mechanism is group strategyproof. Finally, all possible situations for a liar are demonstrated and discussed.

Special Issue Paper
Free to Read

An aggregated signature-based fast RFID batch detection protocol

  • Pages: 1364-1371
  • First Published: 10 July 2013
An aggregated signature-based fast RFID batch detection protocol

The wireless channels between tags and readers are not secure; in order to detect whether the packets transmitted from tags to reader are modified or not, we propose a fast radio frequency identification batch detection protocol that is more suitable to detect the integrity of the packets.

Special Issue Paper
Free to Read

Anomaly diagnosis based on regression and classification analysis of statistical traffic features

  • Pages: 1372-1383
  • First Published: 30 September 2013
Anomaly diagnosis based on regression and classification analysis of statistical traffic features

DDos attacks cause significant changes in traffic shape and its statistic features. Multi traffic statistic features can be used to spot the attack traffic in light of classification and regression theories.

Special Issue Paper
Free to Read

Obtaining K-obfuscation for profile privacy in social networks

  • Pages: 1384-1398
  • First Published: 17 January 2014
Obtaining K-obfuscation for profile privacy in social networks

In this work, we formally present the definition of profile privacy leakage, which is a newly identified privacy leakage in social networks. We propose k-obfuscation to protect profiles against graph property based attacks. We develop a general framework for obtaining k-obfuscation. In this framework, we propose a novel safe vertex-profile mapping mechanism, named as k-mapping. We also design a number of techniques to make the k-mapping method efficient meanwhile maintaining the data utilities.

Special Issue Paper
Free to Read

A secure K-automorphism privacy preserving approach with high data utility in social networks

  • Pages: 1399-1411
  • First Published: 30 September 2013
A secure K-automorphism privacy preserving approach with high data utility in social networks

In this paper, we design a secure and high utility privacy preserving model, called AK-secure, to prevent node identity attack, path length leakage, and edge leakage effectively. On the basis of the AK-secure privacy preserving model, we propose a graph anonymous algorithm, which constructs an anonymous graph satisfying the AK-secure privacy preserving model, minimizing information loss and guaranteeing high data utility.

Special Issue Paper
Free to Read

Memshepherd: comprehensive memory bug fault-tolerance system

  • Pages: 1412-1419
  • First Published: 06 November 2013
Memshepherd: comprehensive memory bug fault-tolerance system

This paper presents Memshepherd, a system that can probabilistically prevent software from both stack and heap memory bugs and guarantee soundness of the software execution. It dynamically reallocates stack-based buffers in the heap space during software execution, and it keeps buffers far from each other by adaptively sizing buffers to be M times of their defined size and randomly placing them. When a buffer is to be deallocated, Memshepherd checks invalid and double frees.

Special Issue Paper
Free to Read

A fixed point model for rate control and routing in cloud data center networks

  • Pages: 1420-1436
  • First Published: 16 December 2013
A fixed point model for rate control and routing in cloud data center networks

A fixed point framework was proposed to formulate the cloud network equilibrium problems. The existence and uniqueness of the network equilibrium points have also been proved. An augmented Lagrangian multiplier algorithm is proposed to obtain the network equilibrium point by solving the nonlinear programming optimization problem.