Table of contents
A comparison of password feedback mechanisms and their impact on password entropy
Mark CiampaText-based passwords created by users are typically weak. A common mitigation is to provide meaningful feedback to users regarding the relative strength of their newly created…
Unified trust establishment by leveraging remote attestation – modeling and analysis
Hamed Khiabani, Norbik Bashah Idris, Jamalul-lail Ab MananAmbient service provisioning with the least human participation in a pervasive computing environment, which is composed of interconnected devices and sensors, raises several trust…
A survey of security risks of mobile social media through blog mining and an extensive literature search
Wu HeAs mobile malware and virus are rapidly increasing in frequency and sophistication, mobile social media has recently become a very popular attack vector. The purpose of this paper…
Deriving an information security assurance indicator at the organizational level
Vinod Pathari, Rajendra M. SonarMeasurement of information security assurance (ISA) is an important but difficult task. This paper aims to propose a framework, which helps in refining information security…
Multi-agency partnerships in cybercrime reduction: Mapping the UK information assurance network cooperation space
Michael Levi, Matthew Leighton Williams– This paper aims to map out multi-agency partnerships in the UK information assurance (UKIA) network in the UK.