Journal: Inf. Manag. Comput. Security

Volume 12, Issue 5

379 -- 388Xing-fen Wang, Yi-jun Li. Formal definition and implementation of business-oriented SoD access control policy
389 -- 400Ning Zhao, David C. Yen, I-Chiu Chang. Auditing in the e-commerce era
401 -- 410Mayur S. Desai, Kiran J. Desai, Lucy Ojode. A global information technology model: business applications in developing economies (case studies)
411 -- 421Sanjay Rawat, Ved Prakash Gulati, Arun K. Pujari. Frequency- and ordering-based similarity measure for host-based intrusion detection