default search action
International Journal of Information Security and Privacy, Volume 2
Volume 2, Number 1, 2008
- Surya B. Yadav:
SEACON: An Integrated Approach to the Analysis and Design of Secure Enterprise Architecture-Based Computer Networks. 1-25 - June Wei, Randall C. Reid, Hongmei Zhang:
Life Cycle Pattern Study of Malicious Codes. 26-41 - Taner Pirim, Tabitha L. James, Katherine T. Boswell, Brian J. Reithel, Reza Barkhi:
An Empirical Investigation of an Individual's Perceived Need for Privacy and Security. 42-53 - Syed Naqvi:
VIPSEC: Virtualized and Pluggable Security Services Architecture for Grids. 54-79 - S. E. Kruck, Faye P. Teer:
Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Use. 80-90
Volume 2, Number 2, 2008
- Hamid Jahankhani, Elidon Beqiri:
Memory-Based Antiforensic Tools and Techniques. 1-13 - Spyridon Papastergiou, Despina Polemi:
A Secure and Trustful E-Ordering Architecture (TOES) for Small and Medium Size Enterprises (SEMs). 14-30 - Li Yang, Chang Phuong, Amy Novobilski, Raimund K. Ege:
Trust-Based Usage Control in Collaborative Environment. 31-45 - Srikanth Palla, Ram Dantu, João W. Cangussu:
Spam Classification Based on E-Mail Path Analysis. 46-69 - John A. Cassini, B. Dawn Medlin, Adriana Romaniello:
Laws and Regulations Dealing with Information Security and Privacy: An Investigative Study. 70-82
Volume 2, Number 3, 2008
- Jeff Barnett:
The Impact of Privacy Legislation on Patient Care. 1-17 - Samia Boucherkha, Mohamed Benmohamed:
Using Statistical Texture Analysis for Medical Image Tamper Proofing. 18-27 - Tamas S. Gal, Zhiyuan Chen, Aryya Gangopadhyay:
A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes. 28-44 - Jingquan Li, Michael J. Shaw:
Electronic Medical Records, HIPAA, and Patient Privacy. 45-54 - Patricia Y. Logan, Debra Noles:
Protecting Patient Information in Outsourced Telehealth Services: Bolting on Security when it cannot be Baked in. 55-70 - B. Dawn Medlin, Joseph A. Cazier, Daniel P. Foulk:
Analyzing the Vulnerability of U.S. Hospitals to Social Engineering Attacks: How Many of Your Employees Would Share Their Password? 71-83 - E. Vance Wilson, David D. Dobrzykowski, Joseph A. Cazier:
The Influence of Media Trust and Internet Trust on Privacy-Risking Uses of E-Health. 84-97
Volume 2, Number 4, 2008
- Zude Li, Xiaojun Ye:
On Access-Unrestricted Data Anonymity and Privacy Inference Disclosure Control. 1-21 - Barbara Carminati, Elena Ferrari, Andrea Perego:
A Decentralized Security Framework for Web-Based Social Networks. 22-53 - Li Yang, Lu Peng, Balachandran Ramadass:
SecCMP: Enhancing Critical Secrets Protection in Chip-Multiprocessors. 54-66 - Bhavani Thuraisingham, Yashaswini Harsha Kumar, Latifur Khan:
Design and Implementation of a Framework for Assured Information Sharing Across Organizational Boundaries. 67-90 - Xun Li, Radhika Santhanam:
Will it be Disclosure or Fabrication of Personal Information? An Examination of Persuasion Strategies on Prospective Employees. 91-109
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.