default search action
International Journal of Dependable and Trustworthy Information Systems, Volume 2
Volume 2, Number 1, 2011
- Sherrie Drye Cannoy:
An Interpretive Study of Critical Issues in Electronic Health Information Exchange. 1-17 - Sandra A. Vannoy:
A Structured Content Analytic Assessment of Business Services Advertisements in the Cloud-Based Web Services Marketplace. 18-49 - Al F. Salam:
Semantic Matchmaking and Decision Support System for Dependable Supplier Selection in the Extended Enterprise Supply Chain. 50-80
Volume 2, Number 2, 2011
- Afonso Araújo Neto, Marco Vieira:
Selecting Secure Web Applications Using Trustworthiness Benchmarking. 1-16 - Brahim Hamid, Huaxi (Yulin) Zhang, Jacob Geisel, David González:
First Experiment on Modeling Safety LifeCycle Process in Railway Systems. 17-39 - Afolayan Ayodele Obiniyi, Ezugwu E. Absalom, Mohammed Dikko:
Network Security and Firewall Technology: A Step to Safety of National IT Vision. 40-60
Volume 2, Number 3, 2011
- Charlie C. Chen:
Cloud Computing in Case-Based Pedagogy: An Information Systems Success Perspective. 1-16 - Amir K. C, Harri Forsgren, Kaj Grahn, Timo Karvi, Göran Pulkkis:
Security and Trust of Public Key Cryptography for HIP and HIP Multicast. 17-35 - Angel R. Otero, Abdel Ejnioui, Carlos E. Otero, Gurvirender Tejay:
Evaluation of Information Security Controls in Organizations by Grey Relational Analysis. 36-54 - Utpal Bose:
Analyzing the Ethical Dilemma between Protecting Consumer Privacy and Marketing Customer Data. 55-68
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.