Journal: IJICS

Volume 1, Issue 4

369 -- 377William Hutchinson. An information-centric and proactive approach to Information Security teaching
378 -- 390Graeme Pye, Matthew J. Warren. E-business security benchmarking: a model and framework
391 -- 399Christopher Bolan. Radio Frequency Identification: a review of low cost tag security proposals
400 -- 413Wayne A. Jansen, Serban I. Gavrila, Clément Séveillac. Smart Cards for mobile devices
414 -- 429Patricia A. H. Williams. Medical data security: Are you informed or afraid?
430 -- 436Craig Valli. Honeypot technologies and their applicability as a strategic internal countermeasure
437 -- 454Timon C. Du, Eldon Y. Li, Jacqueline W. Wong. Document access control in organisational workflows
455 -- 465Chiou-Pirng Wang, Don Snyder, Kathaleena Monds. A conceptual framework for curbing the epidemic of information malice: e-hygiene model with a human-factor approach

Volume 1, Issue 3

237 -- 255Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu. Accountability in organisations
256 -- 277Zhen Yu, William Sears, Yong Guan. PeerCredential: a reputation-based trust framework for Peer-to-Peer applications
278 -- 297Asad Amir Pirzada, Chris McDonald. Collaborative Dynamic Source Routing using transitional trust filters
298 -- 314Lalit Kumar Awasthi, Prashant Kumar. A synchronous checkpointing protocol for mobile distributed systems: probabilistic approach
315 -- 340Alex Hai Wang, Peng Liu 0005, Lunquan Li. Evaluating the survivability of Intrusion Tolerant Database systems and the impact of intrusion detection deficiencies
341 -- 366Suleyman Kondakci. A new assessment and improvement model of risk propagation in information security

Volume 1, Issue 1/2

5 -- 38Maria Luisa Damiani, Elisa Bertino, Paolo Perlasca. Data security in location-aware applications: an approach based on RBAC
39 -- 63Robert Johnson, Jessica Staddon. Deflation-secure web metering
64 -- 108Sarath Indrakanti, Vijay Varadharajan, Ritesh Agarwal. On the design, implementation and application of an authorisation architecture for web services
109 -- 142Guy G. Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, Yanxin Wang, Xia Wang, Natalia Stakhanova. Software fault tree and coloured Petri net-based specification, design and implementation of agent-based intrusion detection systems
143 -- 168Vijayalakshmi Atluri, Soon Ae Chun. A geotemporal role-based authorisation system
169 -- 184Natalia Stakhanova, Samik Basu, Johnny Wong. A taxonomy of intrusion response systems
185 -- 200Lili Yang, Shuang-Hua Yang. A framework of security and safety checking for internet-based control systems
201 -- 209Ya-Fen Chang, Chin-Chen Chang. An RSA-based (t, n) threshold proxy signature scheme with freewill identities
210 -- 233Khidir M. Ali, Thomas J. Owens. Selection of an EAP authentication method for a WLAN