Computer Security: A Literature Review and Classification
Nowadays, numerous journals and conferences have published articles related to computer security, indicating many researchers interest. Therefore, the goal of this paper is to review the works that were published in journals, a classification topic of computer security, and explore each features of classification. This paper is based on literature review of computer security from 2010 to 2012 using a keyword index and article title search. The classification is developed based on the broad topics of computer security, database security and software security. The articles are recognized based on the classification topic. This allows researcher’s to extract several lessons that are important for the implementation of computer security.
Classification, Computer Security, Literature Review, Keyword, Articles
[1]
D. ayetal isreali, "the linux kenel as a case study in software evolution," journal of system and software, pp. 485-501, 2011.
[2]
Ashish E. Arora, "competative and patching of security vulnurabilities:An empiricall analysis," information economy and policy, pp. 664-177, 2011, 5.
[3]
w. j. umar muhammad ibrahim, "determination of trace metal," international journal of scientific research in enveromental science, vol. 3, no. 9, pp. 341-349, 2015.
[4]
A. J. Deepa, V. K. (2012). A comprehensive survey o n Approaches to intrusion Detection system. procedial engineering, 38, 2063-2069.
[5]
Agapios Avramidis, P. K (2011, 12). Chord-PKI: A Distributed trust infrastructure based on P2P networks. Computer Networks, 55(1), 378-398.
[6]
Ahmed I. Sallam, E.-S.E.-R (2012, 6). Encryption- based multilevel model for DBMS. Computers & security, 31(4), 437-446.
[7]
Alan Hope, G. F (2012, 12). Database. Anaesthesis & intensive care medicine,11(12), 495-496.
[8]
Ali Shiravi, H. S. (2012, 5) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Computers & Security,31(3), 357-374.
[9]
Anton V. Uzunov, E. B. (2012, 6). Securing Distributed Systems using patterns: A survey. Computers & Security, 31(5), 681-703.
[10]
Ashish Arora, C. F (2011, 5). Competition and patching of security vulnerabilities: An emphirical analysis, Information Economics and Policy, 22(2),164-177.
[11]
Ayelet Israeli, D. G. (2011). The Linux Kernel as a case study in software evolution. Journal of Systems and Software, 485-501.
[12]
Barbara Carminati, E. F. (2011). Semantic web-based social network access control. Computers & Security, 108-115.
[13]
Bettina Biel, T. G. (2011). Exploring the benefit of the combination of a software architecture analysis and a usuability evaluation of a mobile application. Journal of systems and softwares , 2031-2044.
[14]
Binod Vaidya, J.H.-S. (2011, 3 15). Robust one time password authentication scheme using smart card for home network environment. Computer Communications, 34(3), 326-336.
[15]
Mulitple SOFMs Working Cooperatively in a vote- based Ranking System for network Intrusion Detection .(Charlie Obimbo, Haochen Zhou, Ryan Wilson). Procedia Computer Science, 219-224.
[16]
Chirag N. Modi, D. R. (2012). Integrating Sugnature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing. Procedia Technology, 6, 905-912.
[17]
Chi-Shih Chao, SS.J.-H. (2011,12). A novel three- tiered visualization approach for firewall rule validation. Journal of Visual languages & Computing, 26(6) 401-414.
[18]
Chun-Ta Li,. -S. H. (2010, 1). An efficient biometrics- based remote user authentication scheme using smart cards, Journal of Network and computer Applications 33(1), 1-5.
[19]
M.-S. H. ChunTa Li, "A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks. Information Sciences, 23(1), 5333-5347.
[20]
Da Zhang, C. K (2011, 11). Distributed Court System for Intrusion detection in mobile ad hoc networks," computers & security, 30(8), 555-570.
[21]
Daniel Mellado, C. B.-M. (2011, 6). A systematic review of security requirements engineering. Computer Standards & Interfaces, 32(4), 153-165.
[22]
Dong Ma, Y. W. (2011). "A systematic pattern Matching method based-on DHT structure for intrusion detection in large-scale network. Procedia Engineering, 15, 3511-3515.
[23]
Emilio Corchado, A. H. (2011, 3). Neural visualization of network traffic data for intrusion detection. Applied soft computing, 11(2), 2042-2056.
[24]
Fan YAng, C. H. (2012). Predictive access control for distributed computation. Science of Computer Programming, Available online.
[25]
Furnell, S. Mac Security: An Apple that can't be bitten? Network Security, 7-11, 2011.
[26]
Gaurav Bhatnagar, Q. J. (2010). Biometric Template Security based on Watermarking. Procedia Computer Science, 227-235.
[27]
Gold, S. (2011, 2). The future of the firewall. Network Security, 2011(2), 13-15.
[28]
Soliman, N. A. (2012, 11). A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks. H.H. Soliman, Noha A. Hikal, Nehal A. Sakr, 13(3), 225-238.
[29]
Hamelin, M. (2010, 6). Preventing firewall meltdowns. Network security, 2010(6), 15-16.
[30]
Hamelin, M. (2011, 2). Preparing for a firewall audit. Network security, 2011(2), 18-19.
[31]
Haodong Wang, Q. L. (2011, 5). Achieving distributed user access control in sensor networks. Ad Hoc Networks,10(3), 272-283.
[32]
Hataichanok Unphon, Y. D. (2011, 10). Software architecture awareness in long term software product evolution. Journal of System and Software , 83(11), 2211-2226.
[33]
He XU, S.-P. W.-c.-q. (2011, 10). Efficient P2P-based mutual authentication protocol for RFID system security of EPC network using asymmetric encryption algorithm. The journal of china Universities of Posts and Telecommunication , 18(1), 40-47.
[34]
Hongchao Wang, H.Z.-Y.-C. (2010, 6). A universe access control method based on host identifiers for future internet." Computers & Mathematics with Application Volume, 60(2), 176-186.
[35]
Hugo Gascon, A. O. (2011, 9). Analysis of update delays in signature based network intrusion detection system,Computers & Security 30(18), 613-624.
[36]
Interfaces, C. S (2011, 1). SecurOntology: A semantic web access control framework. Angel Garcia-Crespo, Juan Miguel Gomez-Berbis, Ricardo Colomo-Palacios, Giner Alor-Hernandez , 33(1), 42-49.
[37]
Ioanna Kantzavelou, S. K. (2010, 11). A game based intrusion detection mechanism to confront internet attackers. Computers & Security, 29(8), 859-874.
[38]
Jenny Abramov, A. S. (2012, 9). Evaluation of the Pattern based method for Secure Development (PbSD): A controlled experiment. Information and Software Technology, 54(9), 1029-1043.
[39]
Jenny Abramov, O. A. (2012, 5). A methodology for integrating access control policies within database development. Computer & Security, 31(3), 299-314.
[40]
Jing Dong, T. P. (2011, 3). Automated Verification of security pattern composition. Information and Software Technology, 52(3), 274-295.
[41]
Joan Arnedo-Moreno, J.H.-J. (2010, 1). JTXA resource access control by means of advertisement encryption. Future Generation Computer System, 26(1), 21-28.
[42]
Jonathan J. DAvis, A. J. (2011, 9). Data processing for anomaly based network intrusion detection: A review. Computers and Security,30(6-7), 353-375.
[43]
Jose M. Bande Serrano, J. H. (2012, 3 15). String alignment pre-detection using unique subsequences for FPGA based network intrusion detection. Computer Communications, 35(6), 720-728.
[44]
Kashif Iqbal, M. O. (2012, 6). Content based image retrieval approach for biometric security using colour, texture and shape features controlled by fuzzy heuristics. Journal of Computer and System science ,78(4), 1258-1277.
[45]
Konstantin Stoychev Tsvetkov, T. G. (2012). An Alternative Approach and Attempt to Come Up with a Standard for Biometric User Authentication in a Network Based Environment. Procedia - Social and Behavioral Science, 47,74-78.
[46]
Lawrence Chung, M. N. (2012,3). Novel approaches in the desugn and implementation of system/ software architecture. Journal of systems and software,85(3) 459-462.
[47]
Lei Zhang, Q. W. -F. -N. (2011, 10 27). Assymmetric group key agreement protocol for open networks and its application to broadcast encryption. Computer Networks, 55(15), 3246-3255.
[48]
Lo- Yao Yeh, Y. -C. C. -L. (2011, 3 15). PAACP: A portable privacy-preserving authentication and access control protocol in vehicle ad hoc networks. Computer Communication, 34(3) 447-456.
[49]
Luigi Catuogno, R. G. (2012). smartK: Smart cards in operating systems at kernal level. Information Security Technical Report, Available online.
[50]
Mrutyunjaya Panda, A. A. (2012). A Hybrid Intelligent Approach for Network Intrusion Detection. Procedia Engineering, 30, 1-9.
[51]
Muhammad Khurram Khan, S.-K. K. (2011, 3 15). Cryptanalysis and security enhancement of a more efficient & secure dynamic ID based remote user authentication. Computer Communication 34(3), 305-309.
[52]
N. K. Sreelaja, G. V. (2010, 10). Ant colony optimization based approach for efficient packet filtering in firewall. Applied Soft Computing , 10(4), 1222-1236.
[53]
N. K. Sreelaja, G. V. (2012, 9). Stream cipher for binary image encryption using Ant Colony Optimization based key generation. Applied Soft Computing, 12(9), 2879-2895.
[54]
Nahid Shahmehri, A. M. (2012, 9). An advanced approach for modelling and detection software vulnerabilities. Information Software Technology 54(9), 997-1013.
[55]
L. V. Ning Weng, L. V. (2011, 6 1). Deep packet pre-filtering and finite state encoding for adaptive intrusion detection system," Computer Networks, 55(8), 1648-1661.
[56]
Nitesh B. Guinde, S. G. (2010, 10). Efficient hardware support for pattern matching in network intrusion detection. Computer & Security, 29(7), 756-769.
[57]
P. Salini, S. K. (2012, 11). Survey and analysis on Security Requirement Engineering. Computer & Electrical Engineering, 38(6). 1785-1797.
[58]
Pedro Casas, J. M. (2012, 4). Unsupervised Network Intrusion Detection System: Detecting the Unknown without knowledge. Computer Communications, 35(7), 772-783.
[59]
Pengcheng Zhang, H. M. (2011). A classification and comparism of model checking software architecture techniques. Journal of System and Softeware, 723-744.
[60]
R. Madhusudhan, M. R. (2011, 7). Dynamic ID based remote user password authentication schemes using smart cards: A review. Journal of Network and Computer Applications 55(4), 1235-1248.
[61]
Richard Macfarlane, W. B. (2012, 3). Formal security policy implementation in network firewalls. Computers and Security 31(2), 253-270.
[62]
Rick Kazman, M. G. (2012, 7). Scaling up software architecture analysis. Journal of Systems and Software,85(7), 1511-1519.
[63]
Robin B. Matthews, M. R. (2012, 12 24). Adapting crops and cropping systems to future climates to ensure food security: The role of crop modelling. Global Food Security, Available online.
[64]
Sanaz Rahimi, M. Z. (2012, 12). Analysis of the security of VPN configuration in industrial control environment. International Journal of Critical Infrastructure Protection, 5(1). 3-13, 2012, 3.
[65]
Sergio Pastrana, A. M. -L. (2012, 12). Evaluation of classification algorithms for intrusion detection in MANETS. Knowledge Based System, 36 217-225.
[66]
Sevil Sen, J. A. (2011, 10 7). Evolutionary computation technique for intrusion detection in mobile ad hoc networks. Sevil Sen, John A. Clark, 25(15), 3441-3457.
[67]
Shigen Shen, Y. L. (2011, 9). Signaling game based strategy of intrusion detection in wireless sensor networks. Computers & Mathematics with Application, 62(2), 2404-2416.
[68]
Stere Preda, F. C.- B. -A. (2011, 6). Dynamic deployment of context aware access control policies for constrained security devices. Journal of Systems and Software, 84(7), 1144-1159.
[69]
Tae Kyou Park, H. S. K. (2012). Fine grained log Audition based on secure OS, user command and SQL query. Procedia Engineering, 50, 381-387.
[70]
Tien Ho Chen, H. C. H. K. (2011, 4). Security enhancement on an improvement on two remote user authentication schemes using smart cards. Future Generation Computer Systems, 27(4) 377- 380.
[71]
Tyrone S. Toland, C. F. (2010, 2). The inference problem: maintening maximal available in the presence of database updates. Computers and Security, 29(1) 88-103.
[72]
Vishal Midha, A. B. (2012, 12). Governance practice and software maintenance: A study of open source projects. Decision Support Systems, 5(1) 23-32.
[73]
Walter V. Sujansky, S. A. (2010, 10). A method to implement fine-grained access control for personal health record through standard relational database queries. Journal of Biomedical Information, 43(5), S46-S50.
[74]
William M. Fitzgerald, S. N. (2011, 1). Aligning Semantic Web application with networks access controls. Computer Standards & Interfaces, 33(1), 24-34.
[75]
Wu,Q.- X. (2012). The Research and Application of Firewall based on Netfilter. Physics Procedia, 25, 1231-1235.
[76]
Yang Cao, C. H. (2011, 10). Secure Method for Software Upgrades for Implantable Medical Devices. Tsinghua Science & Technology, 5(5), 517-525.
[77]
Yanrong Shi, Y. H. (2011). CA Prototype System of Campus Network Based on PKI. Procedia Engineering , 3684-3688.
[78]
Yu-Chi Huang, K. L. P. -Y. (2012, 3). A history based cost cognizant test case prioritization technique in regression testing. Journal of System and Software, 85(3) 626-637.
[79]
Yuk Ying, N. W. (2012, 9). A hybrid network intrusion detection system using simplified swarm optimization (SSO). Applied Soft Computing, 12(9), 3014-3022.
[80]
Zhang Lima, M. H. (2011). The security Email based on Smart Card. Physics Procedia 33, 1634-1639.
[81]
"On the versatility of radial basis function neural networks: A case study in the field of intrusion detection," Information Science, pp. 2421-2439, 2010, 6 15.
[82]
"Sender access and data distribution control for inter domain multicast groups," Computer networks, pp. 1646-1671, 2010, 6.
[83]
"Reputation based role assignment for role based access control in wireless sensors networks," computer communication, pp. 281-294, 2011, 3 15.
[84]
"Software flaws set to double," Network security, p. 20, 2011.
[85]
"Web security under threat," Network seurity , pp. 1-2, 2011, 10.
[86]
"Next generation firewalls: security with performance," Network security , 2012, 12.
[87]
Liang Fu Lu, "A new concentric-circle visualization of multi-dimensional data and its application in network security," Journal of Visual Languages & Computing, vol. 21, no. 4, pp. 194-208, 2010.
[88]
M. Patrick, E. R. and J. W., "Trust considerations on attitudes towards online purchasing: The moderating effect of privacy and security concerns," Journal of Business Research, vol. 63, no. 9-10, pp. 1018-1024, 2010.
[89]
J. B. and L. W., "A sound and complete model-generation procedure for consistent and confidentiality-preserving databases," Theoretical Computer Science, vol. 420, no. 31, pp. 4044-4072, 2011.
[90]
P. f. a. f. audit, "Preparing for a firewall audit," Network Security, vol. 2011, no. 2, pp. 18-19, 2011.
[91]
F. Malecki, "Next-generation firewalls: security with performance," Network Security,, vol. 2012, no. 12, pp. 19-20, 2012.
[92]
C.-S. C. and S. J.-H. Y., "A novel three-tiered visualization approach for firewall rule validation," Journal of Visual Languages & Computing, vol. 6, no. 22, pp. 401-414, 2011.
[93]
Yen-Cheng Chen, Lo-Yao Yeh, "PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks," Computer Communications, vol. 34, no. 3, pp. 447-456, 2011.
[94]
Jonathan J. A. DAvis, "Data processing for anomaly based network intrusion detection: A review," Computers and security, pp. 353-375, 2011, 9.
[95]
J. H. Jose M. Bande Serrano, "String alignment pre-detection using unique subsequences for FPGA based network intrusion detection," Computer communication, pp. 720-728, 2012, 3 15.
[96]
M. O. Kashif Iqbal, "Content based image retrieval approach for biometric security using colour, texture and shape features controlled by fuzzy heuristics," Journal of computer and system science , pp. 1258-1277, 2012, 6.
[97]
T. G. Konstantin Stoychev Tsvetkov, "An alternative approach and attempt to come up with a standard for biometric user Authentication in a network based environment," Social and Behavioral Science, pp. 74-78, 2012.
[98]
M. N. Lawrence Chung, "Novel approaches in the desugn and implementation of system/ software architecture," Journal of systems and software, pp. 459-462, 2012, 3.
[99]
Lei Zhang, Qianlong Wu, Chun-Ying Huang, "Assymmetric group key agreement protocol for open networks and its application to broadcast encryption," Computer networks, pp. 3246-3255, 2011, 10 27.
[100]
Yen-Cheng Chen, Lo-Yao Yeh, "A portable privacy preserving authentication and access control protocol in vehicle ad hoc networks," computer communication, pp. 447-456, 2011, 3 15.
[101]
R. G. Luigi Catuogno, "Smart cards in operating systems at kernal level," Information security technical report, Available online , 2012.
[102]
A. A. Mrutyunjaya Panda, "A Hybrid Intelligent approach for network intrusion detection," Procedia Engineering, pp. 1-9, 2012.