:facetid:toc:\"db/journals/ijisp/ijisp4.bht\"OK:facetid:toc:db/journals/ijisp/ijisp4.bhtBandar AlhaqbaniColin J. FidgeProbabilistic Inference Channel Detection and Restriction Applied to Patients' Privacy Assurance.Int. J. Inf. Secur. Priv.4435-592010Journal Articlesclosedjournals/ijisp/AlhaqbaniF1010.4018/JISP.2010100103https://doi.org/10.4018/jisp.2010100103https://dblp.org/rec/journals/ijisp/AlhaqbaniF10URL#5208859Mamoun AwadLatifur KhanBhavani ThuraisinghamPolicy Enforcement System for Inter-Organizational Data Sharing.Int. J. Inf. Secur. Priv.4322-392010Journal Articlesclosedjournals/ijisp/AwadKT1010.4018/JISP.2010070102https://doi.org/10.4018/jisp.2010070102https://dblp.org/rec/journals/ijisp/AwadKT10URL#5208860Zippy ErlichMoshe ZviranGoals and Practices in Maintaining Information Systems Security.Int. J. Inf. Secur. Priv.4340-502010Journal Articlesclosedjournals/ijisp/ErlichZ1010.4018/JISP.2010070103https://doi.org/10.4018/jisp.2010070103https://dblp.org/rec/journals/ijisp/ErlichZ10URL#5208861Sergei Evdokimov 0002Matthias FischmannOliver Günther 0001Provable Security for Outsourcing Database Operations.Int. J. Inf. Secur. Priv.411-172010Journal Articlesclosedjournals/ijisp/EvdokimovFG1010.4018/JISP.2010010101https://doi.org/10.4018/jisp.2010010101https://dblp.org/rec/journals/ijisp/EvdokimovFG10URL#5208862Kevin W. HamlenMurat KantarciogluLatifur KhanBhavani ThuraisinghamSecurity Issues for Cloud Computing.Int. J. Inf. Secur. Priv.4236-482010Journal Articlesclosedjournals/ijisp/HamlenKKT1010.4018/JISP.2010040103https://doi.org/10.4018/jisp.2010040103https://dblp.org/rec/journals/ijisp/HamlenKKT10URL#5208863Fuyu LiuKien A. HuaProtecting User Privacy Better with Query l-Diversity.Int. J. Inf. Secur. Priv.421-182010Journal Articlesclosedjournals/ijisp/LiuH1010.4018/JISP.2010040101https://doi.org/10.4018/jisp.2010040101https://dblp.org/rec/journals/ijisp/LiuH10URL#5208864Munir MajdalawiehThe Integrated Privacy Model: Building a Privacy Model in the Business Processes of the Enterprise.Int. J. Inf. Secur. Priv.431-212010Journal Articlesclosedjournals/ijisp/Majdalawieh1010.4018/JISP.2010070101https://doi.org/10.4018/jisp.2010070101https://dblp.org/rec/journals/ijisp/Majdalawieh10URL#5208865Sunil Kumar MuttooVinay KumarHiding Message in Map Along Pre-Hamiltonian Path.Int. J. Inf. Secur. Priv.4421-342010Journal Articlesclosedjournals/ijisp/MuttooK1010.4018/JISP.2010100102https://doi.org/10.4018/jisp.2010100102https://dblp.org/rec/journals/ijisp/MuttooK10URL#5208866Norman PendegraftMark RoundsRobert W. StoneFactors Influencing College Students' Use of Computer Security.Int. J. Inf. Secur. Priv.4351-602010Journal Articlesclosedjournals/ijisp/PendegraftRS1010.4018/JISP.2010070104https://doi.org/10.4018/jisp.2010070104https://dblp.org/rec/journals/ijisp/PendegraftRS10URL#5208867Manasa SumeethR. I. SinghJ. MillerAre Online Privacy Policies Readable?Int. J. Inf. Secur. Priv.4193-1162010Journal Articlesclosedjournals/ijisp/SumeethSM1010.4018/JISP.2010010105https://doi.org/10.4018/jisp.2010010105https://dblp.org/rec/journals/ijisp/SumeethSM10URL#5208868Ran TaoLi Yang 0001Lu Peng 0001Bin Li 0008A Host-Based Intrusion Detection System Using Architectural Features to Improve Sophisticated Denial-of-Service Attack Detections.Int. J. Inf. Secur. Priv.4118-312010Journal Articlesclosedjournals/ijisp/TaoYPL1010.4018/JISP.2010010102https://doi.org/10.4018/jisp.2010010102https://dblp.org/rec/journals/ijisp/TaoYPL10URL#5208869Charles C. TappertSung-Hyuk ChaMary VillaniRobert S. ZackA Keystroke Biometric Systemfor Long-Text Input.Int. J. Inf. Secur. Priv.4132-602010Journal Articlesclosedjournals/ijisp/TappertCVZ1010.4018/JISP.2010010103https://doi.org/10.4018/jisp.2010010103https://dblp.org/rec/journals/ijisp/TappertCVZ10URL#5208870Robert L. TotterdaleGlobalization and Data Privacy: An Exploratory Study.Int. J. Inf. Secur. Priv.4219-352010Journal Articlesclosedjournals/ijisp/Totterdale1010.4018/JISP.2010040102https://doi.org/10.4018/jisp.2010040102https://dblp.org/rec/journals/ijisp/Totterdale10URL#5208871Garry L. WhiteJu LongGlobal Information Security Factors.Int. J. Inf. Secur. Priv.4249-602010Journal Articlesclosedjournals/ijisp/WhiteL1010.4018/JISP.2010040104https://doi.org/10.4018/jisp.2010040104https://dblp.org/rec/journals/ijisp/WhiteL10URL#5208872Surya B. YadavA Six-View Perspective Framework for System Security: Issues, Risks, and Requirements.Int. J. Inf. Secur. Priv.4161-922010Journal Articlesclosedjournals/ijisp/Yadav1010.4018/JISP.2010010104https://doi.org/10.4018/jisp.2010010104https://dblp.org/rec/journals/ijisp/Yadav10URL#5208873Feng Zhu 0010Sandra CarpenterWei ZhuMatt W. MutkaA Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments.Int. J. Inf. Secur. Priv.441-202010Journal Articlesclosedjournals/ijisp/ZhuCZM1010.4018/JISP.2010100101https://doi.org/10.4018/jisp.2010100101https://dblp.org/rec/journals/ijisp/ZhuCZM10URL#5208874