Table of contents
E‐commerce Web site design: strategies and models
H. Joseph Wen, Houn‐Gee Chen, Hsin‐Ginn HwangThe rapid adoption of the Web as a commercial medium has caused firms to experiment with innovative ways of doing business. Those firms that effectively market themselves on the…
Model calculations to estimate the probability of secret reconstruction in computer environments
Ching‐Yun Lee, Yi‐Shiung Yeh, Deng‐Jyi ChenInformation technologies have ushered in a new era for computer‐related communications. Use of the Internet for commercial applications and resource sharing has accelerated in…
Information systems security in the Greek public sector
Euripidis Loukis, Diomidis SpinellisThe security aspects of public sector information systems are important as the respective systems are often part of critical infrastructures or deal with personal or sensitive…
Formalizing information security requirements
Mariana Gerber, Rossouw von Solms, Paul OverbeekRisk analysis, concentrating on assets, threats and vulnerabilities, used to play a major role in helping to identify the most effective set of security controls to protect…
Robust intrusion tolerance in information systems
Nong YeIntrusions exploit vulnerabilities and introduce external disturbances into information systems to compromise security attributes of information systems such as availability…
Building ontologies for production scheduling systems: towards a unified methodology
Kostas S. Metaxiotis, John E. Psarras, Dimitris AskounisIn this paper we consider the use of ontologies as the basis for structuring and simplifying the process of constructing real‐time problem‐solving tools, focusing specifically on…