Table of contents
An intelligent approach to prevent distributed systems attacks
Nasser S. Abouzakhar, Gordon A. MansonIn today’s society, information and communications technology (ICT) is the force that drives prosperity and provides a higher standard of living. All other e‐services and…
Towards maturity of information security maturity criteria: six lessons learned from software maturity criteria
Mikko SiponenTraditionally, information security management standards listing generic means of protection have received a lot of attention in the field of information security management. In…
Information flow analysis on role‐based access control model
Chang N. Zhang, Cungang YangInformation flow analysis is a necessary step to determine the information security for a given system. In this paper, we introduce an object oriented role‐based access control…
Security of personal data across national borders
Elizabeth Tran, MaryAnne AtkinsonRapid technological advancements present many opportunities in the way people work, communicate and conduct business. That growth is especially prevalent in the World Wide Web. In…
Integrating search engines with data mining for customer‐oriented information search
Tim France, Dave Yen, Jyun‐Cheng Wang, Chia‐Ming ChangIn recent years, the World Wide Web (WWW) has become incredibly popular in homes and offices alike. Consumers need to search for relevant information to help solve purchasing…
The importance of technology trust in Web services security
Pauline RatnasingamThe Internet is changing the way businesses operate today. Firms are using the Web for procurement, to find trading partners, and to link existing applications to other…