default search action
Information Security Journal: A Global Perspective, Volume 19
Volume 19, Number 1, 2010
- Michael Ste. Marie:
Do You Have a Disaster Recovery Plan? 1-3 - Avinash W. Kadam:
Personal Business Continuity Planning. 4-10 - Dattatraya S. Adane, S. R. Sathe:
A Security Model for Securing Data in Multiagent Applications. 11-21 - Rachid Beghdad:
Critical Study of Supervised Learning Techniques in Predicting Attacks. 22-35 - Rama Lingeswara Tammineedi:
Business Continuity Management: A Standards-Based Approach. 36-50
Volume 19, Number 2, 2010
- Ralph Spencer Poore:
Guest Editorial: Cryptographic Hardware-A Short, Practical Checklist. 51-52 - Nicolas Sklavos:
On the Hardware Implementation Cost of Crypto-Processors Architectures. 53-60 - Ju An Wang, Michael M. Guo, Jairo Camargo:
An Ontological Approach to Computer System Security. 61-73 - Apostolos P. Fournaris:
Trust Ensuring Crisis Management Hardware Module. 74-83 - S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari Bhat:
Random Binary and Non-Binary Sequences Derived from Random Sequence of Points on Cyclic Elliptic Curve Over Finite Field GF(2m) and Their Properties. 84-94
- Aaron D. Sanders:
Conficker: Lessons in Secure Software and System Design. 95-99 - Sean Price:
A Heuristic Search for Identifying Required Application Libraries Supporting a Run-Time Security Policy. 100-108
Volume 19, Number 3, 2010
- Greg Gogolin, James Jones:
Law Enforcement's Ability to Deal with Digital Crime and the Implications for Business. 109-117 - David R. Matthews:
eDiscovery versus Computer Forensics. 118-123 - Gavin Wylie Manes, Elizabeth Downing:
What Security Professionals Need to Know About Digital Evidence. 124-131
- Constantine Gikas:
A General Comparison of FISMA, HIPAA, ISO 27000 and PCI-DSS Standards. 132-141 - Anand Gupta, Shyam K. Gupta, Isha Manu Ganesh, Pankhuri Gupta, Vikram Goyal, Sangeeta Sabharwal:
Opaqueness Characteristic of a Context Honeypot System. 142-152 - Irene E. Edge:
Employ Five Fundamental Principles to Produce a SOLID, Secure Network. 153-159 - Xi Li:
How to Take Advantage of Distrusted Parties or Secure Auxiliary Computations for Every Language in NP. 160-174
Volume 19, Number 4, 2010
- Durgesh Kumar Mishra, Manohar Chandwani:
A Secured MultiParty Computational Protocol to Protect Cyber Space. 175-181 - Seung S. Yang, Hongsik Choi, Hankyu Joo:
Vulnerability Analysis of the Grid Data Security Authentication System. 182-190 - Ankur Gupta, Lalit Kumar Awasthi:
A Containment-Based Security Model for Cycle-Stealing P2P Applications. 191-203 - Siva S. Sivatha Sindhu, Arputharaj Kannan:
Evolving Clusters for Network Intrusion Detection System Using Genetic-X-Means Algorithm. 204-212 - V. Vijayaraghavan, Sanjoy Kumar Paul, Rajarathnam Nallusamy:
iMeasure Security (iMS): A Framework for Quantitative Assessment of Security Measures and its Impacts. 213-225 - Virgil Mocanu:
Requirements for Security Enhancements to Legacy Software with RUP. 226-236
Volume 19, Number 5, 2010
- Jin Peng, Xin Zhao:
SSH-Based Device Identity and Trust Initialization. 237-242 - Lo'ai Ali Tawalbeh, Saadeh Sweidan:
Hardware Design and Implementation of ElGamal Public-Key Cryptography Algorithm. 243-252 - Wendy W. Ting, David R. Comings:
Information Assurance Metric for Assessing NIST's Monitoring Step in the Risk Management Framework. 253-262 - S. A. Arunmozhi, Y. Venkataramani:
A Flow Monitoring Scheme to Defend Reduction-of-Quality (RoQ) Attacks in Mobile Ad-hoc Networks. 263-272 - Jyotsna Singh, Parul Garg, Alok Nath De:
Data Hiding in Audio Using Random Orthogonal Matrices. 273-281 - John Mark Chasser:
Security Concerns in IPv6 and Transition Networks. 282-293
Volume 19, Number 6, 2010
- Enuma Orakwue:
Private Clouds: Secure Managed Services. 295-298 - Klaus Julisch, Michael Hall:
Security and Control in the Cloud. 299-309 - Rhonda Farrell:
Securing the Cloud - Governance, Risk, and Compliance Issues Reign Supreme. 310-319
- Fernando Roda, Luis Lara:
Chaotic Cipher Using the Duffing Equation. 320-327 - Vinay Kumar, Sunil Kumar Muttoo:
Graph Theoretic Approach to Steganography to Secure Message Digest. 328-335 - Jonathan Hanny:
Building an Application Security Program. 336-342 - Satyanandan B. Atyam:
Effectiveness of Security Control Risk Assessments for Enterprises: Assess on the Business Perspective of Security Risks. 343-350
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.