default search action
Search dblp for Publications
export results for "toc:db/journals/ijisp/ijisp2.bht:"
@article{DBLP:journals/ijisp/Barnett08, author = {Jeff Barnett}, title = {The Impact of Privacy Legislation on Patient Care}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {3}, pages = {1--17}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008070101}, doi = {10.4018/JISP.2008070101}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/Barnett08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/BoucherkhaB08, author = {Samia Boucherkha and Mohamed Benmohamed}, title = {Using Statistical Texture Analysis for Medical Image Tamper Proofing}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {3}, pages = {18--27}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008070102}, doi = {10.4018/JISP.2008070102}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/BoucherkhaB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/CarminatiFP08, author = {Barbara Carminati and Elena Ferrari and Andrea Perego}, title = {A Decentralized Security Framework for Web-Based Social Networks}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {4}, pages = {22--53}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008100102}, doi = {10.4018/JISP.2008100102}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisp/CarminatiFP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/CassiniMR08, author = {John A. Cassini and B. Dawn Medlin and Adriana Romaniello}, title = {Laws and Regulations Dealing with Information Security and Privacy: An Investigative Study}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {2}, pages = {70--82}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008040105}, doi = {10.4018/JISP.2008040105}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/CassiniMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/GalCG08, author = {Tamas S. Gal and Zhiyuan Chen and Aryya Gangopadhyay}, title = {A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {3}, pages = {28--44}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008070103}, doi = {10.4018/JISP.2008070103}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisp/GalCG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/JahankhaniB08, author = {Hamid Jahankhani and Elidon Beqiri}, title = {Memory-Based Antiforensic Tools and Techniques}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {2}, pages = {1--13}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008040101}, doi = {10.4018/JISP.2008040101}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/JahankhaniB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/KruckT08, author = {S. E. Kruck and Faye P. Teer}, title = {Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Use}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {1}, pages = {80--90}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008010105}, doi = {10.4018/JISP.2008010105}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/KruckT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/LiS08, author = {Jingquan Li and Michael J. Shaw}, title = {Electronic Medical Records, HIPAA, and Patient Privacy}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {3}, pages = {45--54}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008070104}, doi = {10.4018/JISP.2008070104}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/LiS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/LiS08a, author = {Xun Li and Radhika Santhanam}, title = {Will it be Disclosure or Fabrication of Personal Information? An Examination of Persuasion Strategies on Prospective Employees}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {4}, pages = {91--109}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008100105}, doi = {10.4018/JISP.2008100105}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/LiS08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/LiY08, author = {Zude Li and Xiaojun Ye}, title = {On Access-Unrestricted Data Anonymity and Privacy Inference Disclosure Control}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {4}, pages = {1--21}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008100101}, doi = {10.4018/JISP.2008100101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/LiY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/LoganN08, author = {Patricia Y. Logan and Debra Noles}, title = {Protecting Patient Information in Outsourced Telehealth Services: Bolting on Security when it cannot be Baked in}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {3}, pages = {55--70}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008070105}, doi = {10.4018/JISP.2008070105}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/LoganN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/MedlinCF08, author = {B. Dawn Medlin and Joseph A. Cazier and Daniel P. Foulk}, title = {Analyzing the Vulnerability of {U.S.} Hospitals to Social Engineering Attacks: How Many of Your Employees Would Share Their Password?}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {3}, pages = {71--83}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008070106}, doi = {10.4018/JISP.2008070106}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/MedlinCF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/Naqvi08, author = {Syed Naqvi}, title = {{VIPSEC:} Virtualized and Pluggable Security Services Architecture for Grids}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {1}, pages = {54--79}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008010104}, doi = {10.4018/JISP.2008010104}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/Naqvi08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/PallaDC08, author = {Srikanth Palla and Ram Dantu and Jo{\~{a}}o W. Cangussu}, title = {Spam Classification Based on E-Mail Path Analysis}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {2}, pages = {46--69}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008040104}, doi = {10.4018/JISP.2008040104}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/PallaDC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/PapastergiouP08, author = {Spyridon Papastergiou and Despina Polemi}, title = {A Secure and Trustful E-Ordering Architecture {(TOES)} for Small and Medium Size Enterprises (SEMs)}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {2}, pages = {14--30}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008040102}, doi = {10.4018/JISP.2008040102}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/PapastergiouP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/PirimJBRB08, author = {Taner Pirim and Tabitha L. James and Katherine T. Boswell and Brian J. Reithel and Reza Barkhi}, title = {An Empirical Investigation of an Individual's Perceived Need for Privacy and Security}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {1}, pages = {42--53}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008010103}, doi = {10.4018/JISP.2008010103}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/PirimJBRB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/ThuraisinghamKK08, author = {Bhavani Thuraisingham and Yashaswini Harsha Kumar and Latifur Khan}, title = {Design and Implementation of a Framework for Assured Information Sharing Across Organizational Boundaries}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {4}, pages = {67--90}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008100104}, doi = {10.4018/JISP.2008100104}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/ThuraisinghamKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/WeiRZ08, author = {June Wei and Randall C. Reid and Hongmei Zhang}, title = {Life Cycle Pattern Study of Malicious Codes}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {1}, pages = {26--41}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008010102}, doi = {10.4018/JISP.2008010102}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/WeiRZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/WilsonDC08, author = {E. Vance Wilson and David D. Dobrzykowski and Joseph A. Cazier}, title = {The Influence of Media Trust and Internet Trust on Privacy-Risking Uses of E-Health}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {3}, pages = {84--97}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008070107}, doi = {10.4018/JISP.2008070107}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisp/WilsonDC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/Yadav08, author = {Surya B. Yadav}, title = {{SEACON:} An Integrated Approach to the Analysis and Design of Secure Enterprise Architecture-Based Computer Networks}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {1}, pages = {1--25}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008010101}, doi = {10.4018/JISP.2008010101}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/Yadav08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/YangPNE08, author = {Li Yang and Chang Phuong and Amy Novobilski and Raimund K. Ege}, title = {Trust-Based Usage Control in Collaborative Environment}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {2}, pages = {31--45}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008040103}, doi = {10.4018/JISP.2008040103}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/YangPNE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/YangPR08, author = {Li Yang and Lu Peng and Balachandran Ramadass}, title = {SecCMP: Enhancing Critical Secrets Protection in Chip-Multiprocessors}, journal = {Int. J. Inf. Secur. Priv.}, volume = {2}, number = {4}, pages = {54--66}, year = {2008}, url = {https://doi.org/10.4018/jisp.2008100103}, doi = {10.4018/JISP.2008100103}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/YangPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.