Journal: IJISP

Volume 4, Issue 4

1 -- 20Feng W. Zhu, Sandra Carpenter, Wei Zhu, Matt W. Mutka. A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
21 -- 34Sunil Kumar Muttoo, Vinay Kumar. Hiding Message in Map Along Pre-Hamiltonian Path
35 -- 59Bandar Alhaqbani, Colin J. Fidge. Probabilistic Inference Channel Detection and Restriction Applied to Patients Privacy Assurance

Volume 4, Issue 3

1 -- 21Munir Majdalawieh. The Integrated Privacy Model: Building a Privacy Model in the Business Processes of the Enterprise
22 -- 39Mamoun Awad, Latifur Khan, Bhavani M. Thuraisingham. Policy Enforcement System for Inter-Organizational Data Sharing
40 -- 50Zippy Erlich, Moshe Zviran. Goals and Practices in Maintaining Information Systems Security
51 -- 60Norman Pendegraft, Mark Rounds, Robert W. Stone. Factors Influencing College Students Use of Computer Security

Volume 4, Issue 2

1 -- 18Fuyu Liu, Kien A. Hua. Protecting User Privacy Better with Query l-Diversity
36 -- 48Kevin W. Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani M. Thuraisingham. Security Issues for Cloud Computing
49 -- 60Garry White, Ju Long. Global Information Security Factors

Volume 4, Issue 1

1 -- 17Sergei Evdokimov, Matthias Fischmann, Oliver Günther. Provable Security for Outsourcing Database Operations
18 -- 31Ran Tao, Li Yang, Lu Peng, Bin Li. A Host-Based Intrusion Detection System Using Architectural Features to Improve Sophisticated Denial-of-Service Attack Detections
32 -- 60Charles C. Tappert, Sung-Hyuk Cha, Mary Villani, Robert S. Zack. A Keystroke Biometric Systemfor Long-Text Input
61 -- 92Surya B. Yadav. A Six-View Perspective Framework for System Security: Issues, Risks, and Requirements
93 -- 116M. Sumeeth, R. I. Singh, J. Miller. Are Online Privacy Policies Readable?