# IET Information Security

## Filter Results

Displaying Results 1 - 19 of 19
• ### Editorial: Multi-Agent & Distributed Information Security

Publication Year: 2010, Page(s):185 - 187
| |PDF (74 KB)

Information Security (IFS) addresses a sensitive part of information technology where the success of virtually all new technological developments depends on efficient use of automation for human resource management, computer technologies for trustworthy internet, many new communication services and distributed sensor systems for human quality of life and global stability which all heavily depend o... View full abstract»

• ### Distributed security for multi-agent systems - review and applications

Publication Year: 2010, Page(s):188 - 201
Cited by:  Papers (6)
| |PDF (504 KB)

As two major communication technologies, the internet and wireless, are maturing rapidly to dominate our civilised life, the authors urgently need to re-establish users' confidence to harvest new potential applications of large-scale distributed systems. Service agents and distributed multi-agent systems (MASs) have shown the potential to help with this move as the lack of trust caused by heavily ... View full abstract»

• ### Unconditionally secure social secret sharing scheme

Publication Year: 2010, Page(s):202 - 211
Cited by:  Papers (6)
| |PDF (276 KB)

The authors introduce the notion of a social secret sharing scheme, in which shares are allocated based on a player`s reputation and the way he/she interacts with other participants. During the social tuning phase, weights of players are adjusted such that participants who cooperate will end up with more shares than those who defect. Alternatively, newcomers are able to be enrolled in the scheme... View full abstract»

• ### Trust-based on-demand multipath routing in mobile ad hoc networks

Publication Year: 2010, Page(s):212 - 232
Cited by:  Papers (25)
| |PDF (960 KB)

A mobile ad hoc network (MANET) is a self-organised system comprised of mobile wireless nodes. All nodes act as both communicators and routers. Owing to multi-hop routing and absence of centralised administration in open environment, MANETs are vulnerable to attacks by malicious nodes. In order to decrease the hazards from malicious nodes, the authors incorporate the concept of trust to MAN... View full abstract»

• ### Covert channel resistant information leakage protection using a multi-agent architecture

Publication Year: 2010, Page(s):233 - 247
Cited by:  Papers (1)
| |PDF (728 KB)

Covert channel attacks utilise shared resources to indirectly transmit sensitive information to unauthorised parties. Current operating systems (e.g. SELinux) rely on tagging the filesystem with security labels and enforcing security policies at the time of access to a file or resource. However, such mechanisms do not provide strong protection against information laundering via covert channels. Co... View full abstract»

• ### Digital product transaction mechanism for electronic auction environment

Publication Year: 2010, Page(s):248 - 257
| |PDF (481 KB)

The rapid development in electronic commerce and information technology drives the traditional physical product trading evolved to digital product trading. With the effect of the multi-agents system in the Internet environment and the promotions of Government, digital product industry grows fast. The authors proposed a digital product transaction mechanism for electronic auction in the multi-agent... View full abstract»

• ### Survey of security services on group communications

Publication Year: 2010, Page(s):258 - 272
Cited by:  Papers (5)
| |PDF (557 KB)

Secure group communication (SGC) has attracted much attention, as group-oriented communications have been increasingly facilitating many emerging applications that require packet delivery from one or more sender(s) to multiple receivers. Of all proposals reported, most have focused on addressing the issue of key management to SGC systems. The authors, however, advocate that security services are a... View full abstract»

• ### Supporting multi-agent reputation calculation in the Wikipedia Recommender System

Publication Year: 2010, Page(s):273 - 282
Cited by:  Papers (2)
| |PDF (397 KB)

The Wikipedia is a web-based encyclopedia, written and edited collaboratively by Internet users. Over the past decade, the Wikipedia has experienced a dramatic growth in popularity and is considered by many the primary source of information on the Internet. The Wikipedia has an extremely open editorial policy that allows anybody, to create or modify articles. This has resulted in a broad and detai... View full abstract»

• ### Integrated security analysis framework for an enterprise network - a formal approach

Publication Year: 2010, Page(s):283 - 300
Cited by:  Papers (5)
| |PDF (924 KB)

In a typical enterprise network, correct implementation of security policies is becoming increasingly difficult owing to complex security constraints and dynamic changes in network topology. Usually, the network security policy is defined as the collection of service access rules between various network zones. The specification of the security policy is often incomplete since all possible service ... View full abstract»

• ### Multi-level authorisation model and framework for distributed semantic-aware environments

Publication Year: 2010, Page(s):301 - 321
| |PDF (1076 KB)

Semantic technology is widely used in distributed computational environments to increase interoperability and machine readability of information through giving semantics to the underlying information and resources. Semantic-awareness, distribution and interoperability of new generation of distributed systems demand an authorisation model and framework that satisfies essential authorisation require... View full abstract»

• ### Efficient proxy signatures based on trapdoor hash functions

Publication Year: 2010, Page(s):322 - 332
Cited by:  Papers (4)
| |PDF (210 KB)

Proxy signatures have found extensive use in authenticating agents acting on behalf of users in applications such as grid computing, communications systems, personal digital assistants, information management and e-commerce. Importance of proxy signatures has been repeatedly highlighted by applied cryptographers through different variations, namely threshold proxy signatures, blind proxy signature... View full abstract»

• ### Multi-Agent pattern recognition mechanism for detecting distributed denial of service attacks

Publication Year: 2010, Page(s):333 - 343
Cited by:  Papers (3)
| |PDF (435 KB)

Distributed denial of service (DDoS) attacks pose a significant threat to the smooth operations of today's online critical services and applications. Existing mechanisms to detect these attacks have had limited success. With the rapid growth in size and bandwidth of contemporary computer networks, an efficient and effective distributed solution is needed for detecting DDoS attacks. In this study, ... View full abstract»

• ### Recovery of data integrity under multi-tier architectures

Publication Year: 2010, Page(s):344 - 351
| |PDF (251 KB)

Recovery from attacks has been extensively studied at the database transaction level and the application level in recent years. To recover compromised database transactions, compensating and redoing the compromised database transactions need to be conducted under the concurrency control restrictions. Under a multi-tier service architecture, at the application level, attack recovery has more restri... View full abstract»

• ### Cluster-based secure communication mechanism in wireless ad hoc networks

Publication Year: 2010, Page(s):352 - 360
Cited by:  Papers (3)
| |PDF (396 KB)

In a multi-agent system, there are many intelligent agents distributed in the network. To connect with these agents easily and arbitrarily, wireless ad hoc network is a candidate. Wireless ad hoc network is a distinct network environment with characteristics in self-organisation, dynamical network topologies and easy construction. To provide such networks with secure communication, many researcher... View full abstract»

• ### Outlier detection and countermeasure for hierarchical wireless sensor networks

Publication Year: 2010, Page(s):361 - 373
Cited by:  Papers (7)
| |PDF (778 KB)

Outliers in wireless sensor networks (WSNs) are sensor nodes that issue attacks by abnormal behaviours and fake message dissemination. However, existing cryptographic techniques are hard to detect these inside attacks, which cause outlier recognition a critical and challenging issue for reliable and secure data dissemination in WSNs. To efficiently identify and isolate outliers, this study present... View full abstract»

• ### Adaptive link-state routing and intrusion detection in wireless mesh networks

Publication Year: 2010, Page(s):374 - 389
Cited by:  Papers (6)
| |PDF (1099 KB)

Security in wireless mesh networks (WMNs) has always been a major concern ever since the existence of these networks. The open medium and the lack of physical security make the WMNs susceptible to various kinds of attacks. This study addresses the problem of intrusion detection in WMNs. The authors propose a routing protocol that is capable of detecting intrusions, while undertaking the tasks of r... View full abstract»

• ### Physical layer assisted authentication for distributed ad hoc wireless sensor networks

Publication Year: 2010, Page(s):390 - 396
Cited by:  Papers (5)
| |PDF (510 KB)

The paper introduces a novel message authentication framework over broadcast channels, where a symmetric cryptography-based physical layer assisted message authentication (PLAA) scheme is introduced in wireless networks. The proposed framework integrate the conventional message authentication schemes and the physical layer authentication mechanisms by taking advantage of temporal and spatial uniqu... View full abstract»

• ### Anonymity and security for autonomous mobile agents

Publication Year: 2010, Page(s):397 - 410
Cited by:  Papers (3)
| |PDF (547 KB)

The mobile agent security against malicious hosts is one of the most important subjects in mobile agent technology. An extended requirement for an agent security in different applications is to provide it with anonymity property in such a way that the agent can travel in the network without exposing its owner identity and its itinerary. For this purpose, an agent anonymity protocol is proposed to ... View full abstract»

• ### Towards an authorisation model for distributed systems based on the Semantic Web

Publication Year: 2010, Page(s):411 - 421
Cited by:  Papers (1)
| |PDF (608 KB)

Authorisation is a crucial process in current information systems. Nowadays, many of the current authorisation systems do not provide methods to describe the semantics of the underlying information model which they are protecting. This fact can lead to mismatch problems between the semantics of the authorisation model and the semantics of the underlying data and resources being protected. In order... View full abstract»

## Aims & Scope

IET Information Security publishes original research papers in the following areas of information security and cryptography.

Full Aims & Scope

## Meet Our Editors

Publisher
IET Research Journals
iet_ifs@theiet.org