Content
October 2018, Volume 12, Issue 4
- 1-23 Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud: Moye(Ω)
by Martin Konan & Wenyong Wang - 24-34 VuWaDB: A Vulnerability Workaround Database
by Atefeh Khazaei & Mohammad Ghasemzadeh & Christoph Meinel - 35-53 Securing Multiple Biometric Data Using SVD and Curvelet-Based Watermarking
by Rohit M. Thanki & Komal Rajendrakumar Borisagar - 54-67 A New Block Cipher System Using Cellular Automata and Ant Colony Optimization (BC-CaACO)
by Charifa Hanin & Fouzia Omary & Souad Elbernoussi & Khadija Achkoun & Bouchra Echandouri - 68-81 A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain
by Xueping Liang & Sachin Shetty & Deepak K. Tosh & Juan Zhao & Danyi Li & Jihong Liu - 82-97 An Australian Longitudinal Study Into Remnant Data Recovered From Second-Hand Memory Cards
by Patryk Szewczyk & Krishnun Sansurooah & Patricia A. H. Williams
July 2018, Volume 12, Issue 3
- 1-15 A Comparative Study of Privacy Protection Practices in the US, Europe, and Asia
by Noushin Ashrafi & Jean-Pierre Kuilboer - 16-26 SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm
by Bouchra Echandouri & Fouzia Omary & Fatima Ezzahra Ziani & Anas Sadak - 27-41 Improving Power Analysis Peak Distribution Using Canberra Distance to Address Ghost Peak Problem
by Hridoy Jyoti Mahanta & Ajoy Kumar Khan - 42-83 A Literature Review on Image Encryption Techniques
by S Geetha & P Punithavathi & A Magnus Infanteena & S Siva Sivatha Sindhu - 84-99 Blind Image Source Device Identification: Practicality and Challenges
by Udaya Sameer Venkata & Ruchira Naskar - 100-122 Misuse of ‘Break-the-Glass' Policies in Hospitals: Detecting Unauthorized Access to Sensitive Patient Health Data
by Benjamin Stark & Heiko Gewald & Heinrich Lautenbacher & Ulrich Haase & Siegmar Ruff - 141-163 Association Rule Hiding in Privacy Preserving Data Mining
by S. Vijayarani Mohan & Tamilarasi Angamuthu
April 2018, Volume 12, Issue 2
- 1-25 Privacy Preserving and Efficient Outsourcing Algorithm to Public Cloud: A Case of Statistical Analysis
by Malay Kumar & Manu Vardhan - 26-37 Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN
by Geetanjali Rathee & Hemraj Saini - 38-45 A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks
by Jhum Swain & Binod Kumar Pattanayak & Bibudhendu Pati - 46-63 An Improvised Framework for Privacy Preservation in IoT
by Muzzammil Hussain & Neha Kaliya
January 2018, Volume 12, Issue 1
- 1-12 A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security
by Ranjeet Kumar Singh & Dilip Kumar Shaw - 13-28 Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification
by Gautam Kumar & Hemraj Saini - 29-41 CIAS: A Comprehensive Identity Authentication Scheme for Providing Security in VANET
by Arun Malik & Babita Pandey - 42-52 Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN
by Geetanjali Rathee & Hemraj Saini - 53-62 Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN
by Gulshan Kumar & Rahul Saha & Mandeep Singh & Mritunjay Kumar Rai - 63-73 Performance Evaluation of SHA-3 Final Round Candidate Algorithms on ARM Cortex–M4 Processor
by Rajeev Sobti & Geetha Ganesan - 74-88 A Proposed SOAP Model in WS-Security to Avoid Rewriting Attacks and Ensuring Secure Conversation
by Rajni Mohana - 89-98 Breaching Security of Full Round Tiny Encryption Algorithm
by Puneet Kumar Kaushal & Rajeev Sobti
October 2017, Volume 11, Issue 4
- 1-15 A Survey on Denial of Service Attacks and Preclusions
by Nagesh K. & Sumathy R. & Devakumar P. & Sathiyamurthy K. - 16-28 Detection of Drive-by Download Attacks Using Machine Learning Approach
by Monther Aldwairi & Musaab Hasan & Zayed Balbahaith - 29-46 Performance Evaluation of Web Server's Request Queue against AL-DDoS Attacks in NS-2
by Manish Kumar & Abhinav Bhandari - 47-64 Malware Methodologies and Its Future: A Survey
by Chandan Kumar Behera & D. Lalitha Bhaskari
July 2017, Volume 11, Issue 3
- 1-14 A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority
by Sarvesh Tanwar & Anil Kumar - 15-28 Identification of Cryptographic Vulnerability and Malware Detection in Android
by Anjali Kumawat & Anil Kumar Sharma & Sunita Kumawat - 29-41 Malware Detection by Static Checking and Dynamic Analysis of Executables
by Deepti Vidyarthi & S.P. Choudhary & Subrata Rakshit & C.R.S. Kumar - 42-53 Localization in Wireless Sensor Networks Using Soft Computing Approach
by Sunil Kumar Singh & Prabhat Kumar & Jyoti Prakash Singh - 54-62 A Secure Cloud Storage using ECC-Based Homomorphic Encryption
by Daya Sagar Gupta & G. P. Biswas - 63-74 Honeypot Baselining for Zero Day Attack Detection
by Saurabh Chamotra & Rakesh Kumar Sehgal & Ram Swaroop Misra
April 2017, Volume 11, Issue 2
- 1-10 An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password
by Prakash Mohan & Saravanakumar Chelliah - 11-24 Bit Forwarding 3-Bits Technique for Efficient Modular Exponentiation
by Satyanarayana Vollala & B. Shameedha Begum & Amit D. Joshi & N. Ramasubramanian - 25-37 Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies
by Regner Sabillon & Jordi Serra-Ruiz & Victor Cavaller & Jeimy J. Cano - 38-48 PKI Deployment Challenges and Recommendations for ICS Networks
by Nandan Rao & Shubhra Srivastava & Sreekanth K.S. - 49-63 Framework to Secure Browser Using Configuration Analysis
by Harshad Suryakant Wadkar & Arun Mishra & Arati M. Dixit
January 2017, Volume 11, Issue 1
- 1-17 Privacy and Territoriality Issues in an Online Social Learning Portal
by Mohd Anwar & Peter Brusilovsky - 18-34 A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social Bees
by Mohamed Amine Boudia & Reda Mohamed Hamou & Abdelmalek Amine - 35-51 Detecting Wormhole Attack on Data Aggregation in Hierarchical WSN
by Mukesh Kumar & Kamlesh Dutta - 52-64 A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes
by Emmy Mugisha & Gongxuan Zhang & Maouadj Zine El Abidine & Mutangana Eugene
October 2016, Volume 10, Issue 4
- 1-32 Hybrid Intrusion Detection Framework for Ad hoc networks
by Abdelaziz Amara Korba & Mehdi Nafaa & Salim Ghanemi - 33-43 A Framework for Protecting Users' Privacy in Cloud
by Adesina S. Sodiya & Adegbuyi B. - 44-57 Creating Time-Limited Attributes for Time-Limited Services in Cloud Computing
by Azin Moradbeikie & Saied Abrishami & Hasan Abbasi - 58-73 Accurate Classification Models for Distributed Mining of Privately Preserved Data
by Sumana M. & Hareesha K.S.
July 2016, Volume 10, Issue 3
- 1-9 Threshold Secret Sharing Scheme for Compartmented Access Structures
by P. Mohamed Fathimal & P. Arockia Jansi Rani - 10-24 iPhone Forensics: Recovering Investigative Evidence using Chip-off Method
by Nilay R. Mistry & Binoj Koshy & Mohindersinh Dahiya & Chirag Chaudhary & Harshal Patel & Dhaval Parekh & Jaidip Kotak & Komal Nayi & Priyanka Badva - 25-41 Preventing Identity Disclosure in Social Networks Using Intersected Node
by Amardeep Singh & Divya Bansal & Sanjeev Sofat - 42-66 IPHDBCM: Inspired Pseudo Hybrid DNA Based Cryptographic Mechanism to Prevent Against Collabrative Black Hole Attack in Wireless Ad hoc Networks
by Erukala Suresh Babu & C. Nagaraju & M.H.M. Krishna Prasad - 67-86 Metamorphic malware detection using opcode frequency rate and decision tree
by Mahmood Fazlali & Peyman Khodamoradi & Farhad Mardukhi & Masoud Nosrati & Mohammad Mahdi Dehshibi
April 2016, Volume 10, Issue 2
- 1-10 A Smart Grid Security Architecture for Wireless Advanced Metering Infrastructure (AMI)
by Aftab Ahmad - 11-25 Are the Payments System and e-Banking in India Safer than in other SAARC Members?
by Rituparna Das - 26-40 Analysis of Existing Trust Based Routing Schemes Used in Wireless Network
by Kajal S. Patel & Jagdish S. Shah - 41-63 Using Crowd Sourcing to Analyze Consumers' Response to Privacy Policies of Online Social Network and Financial Institutions at Micro Level
by Shaikha Alduaij & Zhiyuan Chen & Aryya Gangopadhyay
January 2016, Volume 10, Issue 1
- 1-27 Combination of Access Control and De-Identification for Privacy Preserving in Big Data
by Amine Rahmani & Abdelmalek Amine & Reda Mohamed Hamou - 28-44 The Compliance of IT Control and Governance: A Case of Macao Gaming Industry
by Colin Lai & Hung-Lian Tang & J. Michael Tarn & Sock Chung - 45-65 A Clustering Approach Using Fractional Calculus-Bacterial Foraging Optimization Algorithm for k-Anonymization in Privacy Preserving Data Mining
by Pawan R. Bhaladhare & Devesh C. Jinwala
October 2015, Volume 9, Issue 4
- 1-19 Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group
by S. Selva Nidhyananthan & Prasad M. & Shantha Selva Kumari R. - 26-58 A New Meta-Heuristic based on Human Renal Function for Detection and Filtering of SPAM
by Mohamed Amine Boudia & Reda Mohamed Hamou & Abdelmalek Amine - 59-76 Secure Group Message Transfer Stegosystem
by Mahinder Pal Singh Bhatia & Manjot Kaur Bhatia & Sunil Kumar Muttoo
July 2015, Volume 9, Issue 3
- 1-20 An Efficient, Anonymous and Unlinkable Incentives Scheme
by Milica Milutinovic & Andreas Put & Bart De Decker - 21-40 A Novel OpenFlow-Based DDoS Flooding Attack Detection and Response Mechanism in Software-Defined Networking
by Rui Wang & Zhiyong Zhang & Lei Ju & Zhiping Jia - 41-56 Signature Restoration for Enhancing Robustness of FPGA IP Designs
by Jing Long & Dafang Zhang & Wei Liang & Xia'an Bi - 57-83 Authentication in Ubiquitous Networking
by Abdullah Mohammed Almuhaideb & Bala Srinivasan - 84-99 Software Defined Intelligent Building
by Rui Yang Xu & Xin Huang & Jie Zhang & Yulin Lu & Ge Wu & Zheng Yan
April 2015, Volume 9, Issue 2
- 1-12 Several Oblivious Transfer Variants in Cut-and-Choose Scenario
by Chuan Zhao & Han Jiang & Qiuliang Xu & Xiaochao Wei & Hao Wang - 13-30 Trust of the Same: Rethinking Trust and Reputation Management from a Structural Homophily Perspective
by Aminu Bello Usman & William Liu & Quan Bai & Ajit Narayanan - 31-59 Cooperative Transmission against Impersonation Attack and Authentication Error in Two-Hop Wireless Networks
by Weidong Yang & Liming Sun & Zhenqiang Xu - 60-74 Observations on Genderwise Differences among University Students in Information Security Awareness
by Ali Farooq & Johanna Isoaho & Seppo Virtanen & Jouni Isoaho
January 2015, Volume 9, Issue 1
- 1-25 Client-Side Detection of Clickjacking Attacks
by Hossain Shahriar & Hisham M. Haddad - 26-46 A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour
by Teodor Sommestad & Henrik Karlzén & Jonas Hallberg - 47-61 Short Online/Off-line Signature Scheme for Wireless Sensor Networks
by Anser Ghazzaal Ali Alquraishee & Jayaprakash Kar & Naomie Salim - 62-77 Disassociations in Security Policy Lifecycles
by Michael Lapke & Gurpreet Dhillon
October 2014, Volume 8, Issue 4
- 1-25 A New Negative Selection Algorithm for Adaptive Network Intrusion Detection System
by Chikh Ramdane & Salim Chikhi - 26-43 Toward Proactive Mobile Tracking Management
by Hella Kaffel Ben Ayed & Asma Hamed - 44-61 An Adaptive Trustworthiness Modelling Approach for Ubiquitous Software Systems
by Amr Ali-Eldin & Jan Van Den Berg & Semir Daskapan - 62-102 A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks
by Piotr Książak & William Farrelly & Kevin Curran
July 2014, Volume 8, Issue 3
- 1-12 Users' Perception of Security for Mobile Communication Technology
by Mohanad Halaweh - 13-38 A New Fuzzy-Based Approach for Anonymity Quantification in E-Services
by Wiem Hammami & Ilhem Souissi & Lamjed Ben Said - 39-62 Balanced Approach for Hiding Sensitive Association Rules in Data Sharing Environment
by Janakiramaiah Bonam & Ramamohan Reddy - 63-76 TCP/IP Reassembly in Network Intrusion Detection and Prevention Systems
by Xiaojun Wang & Brendan Cronin
April 2014, Volume 8, Issue 2
- 1-18 A Firegroup Mechanism to Provide Intrusion Detection and Prevention System Against DDos Attack in Collaborative Clustered Networks
by M. Poongodi & S. Bose - 19-32 Classification of DOS Attacks Using Visualization Technique
by Mohamed Cheikh & Salima Hacini & Zizette Boufaida - 33-54 Empirical Analysis of Software Piracy in Asia (Japan VS. Vietnam): An Exploratory Study
by Xiang Fang & Sooun Lee - 55-68 Data Hiding Method Based on Inter-Block Difference in Eight Queens Solutions and LSB Substitution
by Vinay Kumar & Abhishek Bansal & Sunil Kumar Muttoo
January 2014, Volume 8, Issue 1
- 1-18 Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective
by Mathew Nicho & Shafaq Khan - 19-37 A Covert Communication Model-Based on Image Steganography
by Mamta Juneja - 38-61 An Integrated Dynamic Model Optimizing the Risk on Real Time Operating System
by Prashanta Kumar Patra & Padma Lochan Pradhan - 62-78 An Efficient Intrusion Alerts Miner for Forensics Readiness in High Speed Networks
by Aymen Akremi & Hassen Sallay & Mohsen Rouached
October 2013, Volume 7, Issue 4
- 1-10 Secure Communication: A Proposed Public Key Watermark System
by Shadi R. Masadeh & Shadi Aljawarneh & Ashraf Odeh & Abdullah Alhaj - 11-21 Implementation of Improved Hash and Mapping Modified Low Power Parallel Bloom Filter Design
by K. Saravanan & A. Senthilkumar - 22-36 A Survey of Security Standards Applicable to Health Information Systems
by Francis Akowuah & Xiaohong Yuan & Jinsheng Xu & Hong Wang - 37-52 An Intelligent Network Intrusion Detection System Based on Multi-Modal Support Vector Machines
by Srinivasa K G - 53-74 False Alarm Reduction Using Adaptive Agent-Based Profiling
by Salima Hacini & Zahia Guessoum & Mohamed Cheikh
July 2013, Volume 7, Issue 3
- 1-15 A More Secure Image Hiding Scheme Using Pixel Adjustment and Genetic Algorithm
by Omar Banimelhem & Lo’ai Tawalbeh & Moad Mowafi & Mohammed Al-Batati - 16-35 Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA
by Daniela Simić-Draws & Stephan Neumann & Anna Kahlert & Philipp Richter & Rüdiger Grimm & Melanie Volkamer & Alexander Roßnagel - 36-52 A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain
by Esraa Omran & Tyrone Grandison & David Nelson & Albert Bokma - 53-67 dDelega: Trust Management for Web Services
by Michele Tomaiuolo
April 2013, Volume 7, Issue 2
- 1-28 Development of A Formal Security Model for Electronic Voting Systems
by Katharina Bräunlich & Rüdiger Grimm - 29-43 Malware Detection and Prevention System Based on Multi-Stage Rules
by Ammar Alazab & Michael Hobbs & Jemal Abawajy & Ansam Khraisat - 44-56 Robust Image Data Hiding Technique for Copyright Protection
by Siddharth Singh & Tanveer J. Siddiqui - 57-85 Formal Verification of Secrecy, Coercion Resistance and Verifiability Properties for a Remote Electronic Voting Protocol
by Khaoula Marzouki & Amira Radhouani & Narjes Ben Rajeb
January 2013, Volume 7, Issue 1
- 1-15 Spearing High Net Wealth Individuals: The Case of Online Fraud and Mature Age Internet Users
by Nigel Martin & John Rice - 16-29 Child Security in Cyberspace Through Moral Cognition
by Satya Prakash & Abhishek Vaish & Natalie Coul & SaravanaKumar G & T.N. Srinidhi & Jayaprasad Botsa - 30-44 Contributing Factors of Information Security Investments in South East Asia SMBs: A Technology- Organisational -Environment Approach
by Mathews Z. Nkhoma & Duy P. T. Dang - 45-62 Business Driven User Role Assignment: Nimble Adaptation of RBAC to Organizational Changes
by Ousmane Amadou Dia & Csilla Farkas - 63-75 Computational Complexity Analysis for a Class of Symmetric Cryptosystems Using Simple Arithmetic Operations and Memory Access Time
by Walid Y. Zibideh & Mustafa M. Matalgah
October 2012, Volume 6, Issue 4
- 1-39 A Full Review of Attacks and Countermeasures in Wireless Sensor Networks
by Pejman Niksaz & Mohammad Javad Kargar - 40-54 A Survey of U.S. Laws for Health Information Security & Privacy
by Francis Akowuah & Xiaohong Yuan & Jinsheng Xu & Hong Wang - 55-70 Secure Data Hiding Using Eight Queens Solutions
by Sunil Kumar Muttoo & Vinay Kumar & Abhishek Bansal - 71-93 Secure Information Delivery through High Bitrate Data Embedding within Digital Video and its Application to Audio/Video Synchronization
by Ming Yang & Chih-Cheng Hung & Edward Jung - 94-116 CITS: The Cost of IT Security Framework
by Marco Spruit & Wouter de Bruijn
July 2012, Volume 6, Issue 3
- 1-37 A Comparative Survey on Cryptology-Based Methodologies
by Allan Rwabutaza & Ming Yang & Nikolaos Bourbakis - 38-55 Information Security Awareness at Saudi Arabians’ Organizations: An Information Technology Employee’s Perspective
by Zakarya A. Alzamil - 56-74 Critical Evaluation of RFID Security Protocols
by Azam Zavvari & Ahmed Patel - 75-87 Investing in IT Security: How to Determine the Maximum Threshold
by Amanda Eisenga & Travis L. Jones & Walter Rodriguez - 88-110 A Practical Approach of Fairness in E-Procurement
by Debajyoti Konar & Chandan Mazumdar
April 2012, Volume 6, Issue 2
- 1-15 Safety Measures for Social Computing in Wiki Learning Environment
by Ahmed Patel & Mona Taghavi & Joaquim Celestino Júnior & Rodziah Latih & Abdullah Mohd Zin - 16-33 Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification
by Dongjin Kim & Zhiyuan Chen & Aryya Gangopadhyay - 34-52 Securing Fingerprint Images Through PSO Based Robust Facial Watermarking
by Roli Bansal & Priti Sehgal & Punam Bedi - 53-63 ECFS: An Enterprise-Class Cryptographic File System for Linux
by U. S. Rawat & Shishir Kumar - 64-94 Secure and Optimized Mobile Based Merchant Payment Protocol using Signcryption
by Shaik Shakeel Ahamad & V. N. Sastry & Siba K. Udgata
January 2012, Volume 6, Issue 1
- 1-13 Global Analysis of Security and Trust Perceptions in Web Design for E-Commerce
by S. Srinivasan & Robert Barker - 14-32 Designing a Secure Cloud Architecture: The SeCA Model
by Thijs Baars & Marco Spruit - 33-56 Performance and Scalability Assessment for Non-Certificate-Based Public Key Management in VANETs
by Pei-Yuan Shen & Maolin Tang & Vicky Liu & William Caelli - 57-76 Towards Usable Application-Oriented Access Controls: Qualitative Results from a Usability Study of SELinux, AppArmor and FBAC-LSM
by Z. Cliffe Schreuders & Tanya McGill & Christian Payne
October 2011, Volume 5, Issue 4
- 1-7 A Privacy Agreement Negotiation Model in B2C E-Commerce Transactions
by Murthy V. Rallapalli - 8-30 A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements
by O. T. Arogundade & A. T. Akinwale & Z. Jin & X. G. Yang - 31-46 Evaluating the Quality and Usefulness of Data Breach Information Systems
by Benjamin Ngugi & Jafar Mana & Lydia Segal - 47-58 Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework
by Hassen Sallay & Mohsen Rouached & Adel Ammar & Ouissem Ben Fredj & Khalid Al-Shalfan & Majdi Ben Saad
July 2011, Volume 5, Issue 3
- 1-18 Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card
by Ahmed Patel & Kenan Kalajdzic & Laleh Golafshan & Mona Taghavi - 19-35 E-Voting Risk Assessment: A Threat Tree for Direct Recording Electronic Systems
by Harold Pardue & Jeffrey P. Landry & Alec Yasinsac - 36-49 Intrusion Detection Algorithm for MANET
by S. Srinivasan & S. P. Alampalayam - 50-67 An Integrated Security Governance Framework for Effective PCI DSS Implementation
by Mathew Nicho & Hussein Fakhry & Charles Haiber
April 2011, Volume 5, Issue 2
- 1-12 User Perceptions of Security Technologies
by Douglas M. Kline & Ling He & Ulku Yaylacicegi - 13-32 Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree
by Golam Kaosar & Xun Yi - 33-53 A Mark-Up Language for the Specification of Information Security Governance Requirements
by Anirban Sengupta & Chandan Mazumdar - 54-60 On the Security of Self-Certified Public Keys
by Cheng-Chi Lee & Min-Shiang Hwang & I-En Liao
January 2011, Volume 5, Issue 1
- 1-13 A Secure Hybrid Network Solution to Enhance the Resilience of the UK Government National Critical Infrastructure TETRA Deployment
by Devon Bennett & Hamid Jahankhani & Mohammad Dastbaz & Hossein Jahankhani - 14-32 A Self-Supervised Approach to Comment Spam Detection Based on Content Analysis
by A. Bhattarai & D. Dasgupta - 33-49 A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications
by Ioana Lasc & Reiner Dojen & Tom Coffey - 50-66 Information Privacy: Implementation and Perception of Laws and Corporate Policies by CEOs and Managers
by Garry L. White & Francis A. Méndez Mediavilla & Jaymeen R. Shah
October 2010, Volume 4, Issue 4
- 1-20 A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
by Feng W. Zhu & Sandra Carpenter & Wei Zhu & Matt Mutka - 21-34 Hiding Message in Map Along Pre-Hamiltonian Path
by Sunil Kumar Muttoo & Vinay Kumar - 35-59 Probabilistic Inference Channel Detection and Restriction Applied to Patients’ Privacy Assurance
by Bandar Alhaqbani & Colin Fidge
July 2010, Volume 4, Issue 3
- 1-21 The Integrated Privacy Model: Building a Privacy Model in the Business Processes of the Enterprise
by Munir Majdalawieh - 22-39 Policy Enforcement System for Inter-Organizational Data Sharing
by Mamoun Awad & Latifur Khan & Bhavani Thuraisingham - 40-50 Goals and Practices in Maintaining Information Systems Security
by Zippy Erlich & Moshe Zviran - 51-60 Factors Influencing College Students’ Use of Computer Security
by Norman Pendegraft & Mark Rounds & Robert W. Stone
April 2010, Volume 4, Issue 2
- 1-18 Protecting User Privacy Better with Query l-Diversity
by Fuyu Liu & Kien A. Hua - 19-35 Globalization and Data Privacy: An Exploratory Study
by Robert L. Totterdale - 36-48 Security Issues for Cloud Computing
by Kevin Hamlen & Murat Kantarcioglu & Latifur Khan & Bhavani Thuraisingham - 49-60 Global Information Security Factors
by Garry White & Ju Long
January 2010, Volume 4, Issue 1
- 1-17 Provable Security for Outsourcing Database Operations
by Sergei Evdokimov & Matthias Fischmann & Oliver Günther - 18-31 A Host-Based Intrusion Detection System Using Architectural Features to Improve Sophisticated Denial-of-Service Attack Detections
by Ran Tao & Li Yang & Lu Peng & Bin Li - 32-60 A Keystroke Biometric Systemfor Long-Text Input
by Charles C. Tappert & Sung-Hyuk Cha & Mary Villani & Robert S. Zack - 61-92 A Six-View Perspective Framework for System Security: Issues, Risks, and Requirements
by Surya B. Yadav - 93-116 Are Online Privacy Policies Readable?
by M. Sumeeth & R. I. Singh & J. Miller
October 2009, Volume 3, Issue 4
- 1-17 Preserving Privacy in Mining Quantitative Associations Rules
by Madhu V. Ahluwalia & Aryya Gangopadhyay & Zhiyuan Chen - 18-28 A New Soa Security Model to Protect Against Web Competitive Intelligence Attacks by Software Agents
by Hamidreza Amouzegar & Mohammad Jafar Tarokh & Anahita Naghilouye Hidaji - 29-42 PAKE on the Web
by Xunhua Wang & Hua Lin - 43-67 Three Models to Measure Information Security Compliance
by Wasim A. Al-Hamdani - 68-95 Do You Know Where Your Data Is? A Study of the Effect of Enforcement Strategies on Privacy Policies
by Ian Reay & Patricia Beatty & Scott Dick & James Miller
July 2009, Volume 3, Issue 3
- 1-13 Security and Privacy Issues in Secure E-Mail Standards and Services
by Lei Chen & Wen-Chen Hu & Ming Yang & Lei Zhang - 14-36 Applied Cryptography for Security and Privacy in Wireless Sensor Networks
by Dulal C. Kar & Hung L. Ngo & Geetha Sanapala - 37-54 Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy
by Ming Yang & Monica Trifas & Guillermo Francia III & Lei Chen - 55-75 Cloak and Dagger: Man-In-The-Middle and Other Insidious Attacks
by Ramakrishna Thurimella & William Mitchell - 76-106 Fair Electronic Exchange Based on Fingerprint Biometrics
by Harkeerat Bedi & Li Yang - 107-122 Secure and Private Service Discovery in Pervasive Computing Environments
by Feng Zhu & Wei Zhu
April 2009, Volume 3, Issue 2
- 1-9 Information Systems Security Assurance Management at Municipal Software Solutions, Inc
by Virginia Franke Kleist & Bonnie Morris & James W. Denton - 10-41 A Chronicle of a Journey: An E-Mail Bounce Back System
by Alex Kosachev & Hamid R. Nemati - 42-53 Data Privacy and Security: HIPAA and Small Business Compliance
by James Suleiman & Terry Huston - 54-67 PCI Compliance: Overcoming the Challenges
by Benjamin Ngugi & Gina Vega & Glenn Dardick - 68-83 Information Technology Security Concerns in Global Financial Services Institutions: Do Socio-Economic Factors Differentiate Perceptions?
by Princely Ifinedo - 84-89 Information Security by Words Alone: The Case for Strong Security Policies
by Kirk P. Arnett & Gary F. Templeton & David A. Vance - 90-104 The Social Organization of a Criminal Hacker Network: A Case Study
by Yong Lu
January 2009, Volume 3, Issue 1
- 1-10 Re-Evaluation of On-Line Hot Topic Discovery Model
by Hui-min Ye & Sushil K. Sharma & Huinan Xu - 11-29 Understanding User Behavior towards Passwords through Acceptance and Use Modelling
by Lee Novakovic & Tanya McGill & Michael Dixon - 30-44 Without Permission: Privacy on the Line
by Joanne H. Pratt & Sue Conger - 45-64 Do Privacy Statements Really Work? The Effect of Privacy Statements and Fair Information Practices on Trust and Perceived Risk in E-Commerce
by Hamid R. Nemati & Thomas Van Dyke - 65-72 Large Key Sizes and the Security of Password-Based Cryptography
by Kent D. Boklan
October 2008, Volume 2, Issue 4
- 1-21 On Access-Unrestricted Data Anonymity and Privacy Inference Disclosure Control
by Zude Li & Xiaojun Ye - 22-53 A Decentralized Security Framework for Web-Based Social Networks
by Barbara Carminati & Elena Ferrari & Andrea Perego - 54-66 SecCMP: Enhancing Critical Secrets Protection in Chip-Multiprocessors
by Li Yang & Lu Peng & Balachandran Ramadass - 67-90 Design and Implementation of a Framework for Assured Information Sharing Across Organizational Boundaries
by Bhavani Thuraisingham & Yashaswini Harsha Kumar & Latifur Khan - 91-109 Will it be Disclosure or Fabrication of Personal Information? An Examination of Persuasion Strategies on Prospective Employees
by Xun Li & Radhika Santhanam
July 2008, Volume 2, Issue 3
- 1-17 The Impact of Privacy Legislation on Patient Care
by Jeff Barnett - 18-27 Using Statistical Texture Analysis for Medical Image Tamper Proofing
by Samia Boucherkha & Mohamed Benmohamed - 28-44 A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes
by Tamas S. Gal & Zhiyuan Chen & Aryya Gangopadhyay - 45-54 Electronic Medical Records, HIPAA, and Patient Privacy
by Jingquan Li & Michael J. Shaw - 55-70 Protecting Patient Information in Outsourced Telehealth Services: Bolting on Security when it cannot be Baked in
by Patricia Y. Logan & Debra Noles - 71-83 Analyzing the Vulnerability of U.S. Hospitals to Social Engineering Attacks: How Many of Your Employees Would Share Their Password?
by B. Dawn Medlin & Joseph A. Cazier & Daniel P. Foulk - 84-97 The Influence of Media Trust and Internet Trust on Privacy-Risking Uses of E-Health
by E. Vance Wilson & David D. Dobrzykowski & Joseph A. Cazier
April 2008, Volume 2, Issue 2
- 1-13 Memory-Based Antiforensic Tools and Techniques
by Hamid Jahankhani & Elidon Beqiri - 14-30 A Secure and Trustful E-Ordering Architecture (TOES) for Small and Medium Size Enterprises (SEMs)
by Spyridon Papastergiou & Despina Polemi