Journal: IJISP

Volume 7, Issue 3

1 -- 15Omar Banimelhem, Lo'ai Ali Tawalbeh, Moad Mowafi, Mohammed Al-Batati. A More Secure Image Hiding Scheme Using Pixel Adjustment and Genetic Algorithm
16 -- 35Daniela Simic-Draws, Stephan Neumann, Anna Kahlert, Philipp Richter, Rüdiger Grimm, Melanie Volkamer, Alexander Roßnagel. Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA
36 -- 52Esraa Omran, Tyrone Grandison, David Nelson, Albert Bokma. A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain
53 -- 67Michele Tomaiuolo. dDelega: Trust Management for Web Services