Table of contents
Formal definition and implementation of business‐oriented SoD access control policy
Wang Xing‐fen, Li Yi‐junBased on organizational task decomposition, an extensive role‐based access control (ERBAC) model is proposed in this paper. In ERBAC, the abstract concept of “permission” in…
Auditing in the e‐commerce era
Ning Zhao, David C. Yen, I‐Chiu ChangFinancial statements are not as important to investors as they once were, as technology has changed the way companies create value today. While these changes pose serious threats…
A global information technology model: business applications in developing economies (case studies)
Mayur S. Desai, Kiran J. Desai, Lucy OjodeThis paper develops a global information technology model that captures the main drivers of a firm's IT applications in multiple markets with two illustrative company cases. The…
Frequency‐ and ordering‐based similarity measure for host‐based intrusion detection
Sanjay Rawat, V.P. Gulati, Arun K. PujariThis paper discusses a new similarity measure for the anomaly‐based intrusion detection scheme using sequences of system calls. With the increasing frequency of new attacks, it is…