Table of contents
Information security technologies as a commodity input
Andrew StewartThe paper provides a pragmatic evaluation of the value that security technologies deliver to businesses. It contains recommendations for how businesses can best view the role of…
Exploring radio frequency identification technology and its impact on business systems
Alan D. SmithTo provide practitioners of management a sense of the importance of strategically leveraging the current and historic development of radio frequency identification (RFID) in order…
An access control framework for web services
M. Coetzee, J.H.P. EloffTo define a framework for access control for virtual applications, enabled through web services technologies. The framework supports the loosely coupled manner in which web…
A novel approach for regenerating a private key using password, fingerprint and smart card
Fawad Ahmed, M.Y. SiyalTo devise a biometric‐based mechanism for enhancing security of private keys used in cryptographic applications.
Goal directed project management methodology for the support of ERP implementation and optimal adaptation procedure
Kostas Metaxiotis, Ioannis Zafeiropoulos, Konstantina Nikolinakou, John PsarrasTo control and reduce the time and the cost of implementation and to achieve optimal adaptation of the processes and structures of the enterprise in an ERP environment.
Maintaining privacy in anomaly‐based intrusion detection systems
A.S. Sodiya, H.O.D. Longe, A.T. AkinwaleThe goal of our work is to discuss the fundamental issues of privacy and anomaly‐based intrusion detection systems (IDS) and to design an efficient anomaly‐based intrusion IDS…