Search dblp for Publications

export results for "toc:db/journals/ijisp/ijisp2.bht:"

 download as .bib file

@article{DBLP:journals/ijisp/Barnett08,
  author       = {Jeff Barnett},
  title        = {The Impact of Privacy Legislation on Patient Care},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {1--17},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008070101},
  doi          = {10.4018/JISP.2008070101},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/Barnett08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/BoucherkhaB08,
  author       = {Samia Boucherkha and
                  Mohamed Benmohamed},
  title        = {Using Statistical Texture Analysis for Medical Image Tamper Proofing},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {18--27},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008070102},
  doi          = {10.4018/JISP.2008070102},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/BoucherkhaB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/CarminatiFP08,
  author       = {Barbara Carminati and
                  Elena Ferrari and
                  Andrea Perego},
  title        = {A Decentralized Security Framework for Web-Based Social Networks},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {4},
  pages        = {22--53},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008100102},
  doi          = {10.4018/JISP.2008100102},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/CarminatiFP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/CassiniMR08,
  author       = {John A. Cassini and
                  B. Dawn Medlin and
                  Adriana Romaniello},
  title        = {Laws and Regulations Dealing with Information Security and Privacy:
                  An Investigative Study},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {2},
  pages        = {70--82},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008040105},
  doi          = {10.4018/JISP.2008040105},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/CassiniMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/GalCG08,
  author       = {Tamas S. Gal and
                  Zhiyuan Chen and
                  Aryya Gangopadhyay},
  title        = {A Privacy Protection Model for Patient Data with Multiple Sensitive
                  Attributes},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {28--44},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008070103},
  doi          = {10.4018/JISP.2008070103},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisp/GalCG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/JahankhaniB08,
  author       = {Hamid Jahankhani and
                  Elidon Beqiri},
  title        = {Memory-Based Antiforensic Tools and Techniques},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {2},
  pages        = {1--13},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008040101},
  doi          = {10.4018/JISP.2008040101},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/JahankhaniB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/KruckT08,
  author       = {S. E. Kruck and
                  Faye P. Teer},
  title        = {Computer Security Practices and Perceptions of the Next Generation
                  of Corporate Computer Use},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {80--90},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008010105},
  doi          = {10.4018/JISP.2008010105},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/KruckT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/LiS08,
  author       = {Jingquan Li and
                  Michael J. Shaw},
  title        = {Electronic Medical Records, HIPAA, and Patient Privacy},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {45--54},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008070104},
  doi          = {10.4018/JISP.2008070104},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/LiS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/LiS08a,
  author       = {Xun Li and
                  Radhika Santhanam},
  title        = {Will it be Disclosure or Fabrication of Personal Information? An Examination
                  of Persuasion Strategies on Prospective Employees},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {4},
  pages        = {91--109},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008100105},
  doi          = {10.4018/JISP.2008100105},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/LiS08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/LiY08,
  author       = {Zude Li and
                  Xiaojun Ye},
  title        = {On Access-Unrestricted Data Anonymity and Privacy Inference Disclosure
                  Control},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {4},
  pages        = {1--21},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008100101},
  doi          = {10.4018/JISP.2008100101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/LiY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/LoganN08,
  author       = {Patricia Y. Logan and
                  Debra Noles},
  title        = {Protecting Patient Information in Outsourced Telehealth Services:
                  Bolting on Security when it cannot be Baked in},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {55--70},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008070105},
  doi          = {10.4018/JISP.2008070105},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/LoganN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/MedlinCF08,
  author       = {B. Dawn Medlin and
                  Joseph A. Cazier and
                  Daniel P. Foulk},
  title        = {Analyzing the Vulnerability of {U.S.} Hospitals to Social Engineering
                  Attacks: How Many of Your Employees Would Share Their Password?},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {71--83},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008070106},
  doi          = {10.4018/JISP.2008070106},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/MedlinCF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/Naqvi08,
  author       = {Syed Naqvi},
  title        = {{VIPSEC:} Virtualized and Pluggable Security Services Architecture
                  for Grids},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {54--79},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008010104},
  doi          = {10.4018/JISP.2008010104},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/Naqvi08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/PallaDC08,
  author       = {Srikanth Palla and
                  Ram Dantu and
                  Jo{\~{a}}o W. Cangussu},
  title        = {Spam Classification Based on E-Mail Path Analysis},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {2},
  pages        = {46--69},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008040104},
  doi          = {10.4018/JISP.2008040104},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/PallaDC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/PapastergiouP08,
  author       = {Spyridon Papastergiou and
                  Despina Polemi},
  title        = {A Secure and Trustful E-Ordering Architecture {(TOES)} for Small and
                  Medium Size Enterprises (SEMs)},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {2},
  pages        = {14--30},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008040102},
  doi          = {10.4018/JISP.2008040102},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/PapastergiouP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/PirimJBRB08,
  author       = {Taner Pirim and
                  Tabitha L. James and
                  Katherine T. Boswell and
                  Brian J. Reithel and
                  Reza Barkhi},
  title        = {An Empirical Investigation of an Individual's Perceived Need for Privacy
                  and Security},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {42--53},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008010103},
  doi          = {10.4018/JISP.2008010103},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/PirimJBRB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/ThuraisinghamKK08,
  author       = {Bhavani Thuraisingham and
                  Yashaswini Harsha Kumar and
                  Latifur Khan},
  title        = {Design and Implementation of a Framework for Assured Information Sharing
                  Across Organizational Boundaries},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {4},
  pages        = {67--90},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008100104},
  doi          = {10.4018/JISP.2008100104},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/ThuraisinghamKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/WeiRZ08,
  author       = {June Wei and
                  Randall C. Reid and
                  Hongmei Zhang},
  title        = {Life Cycle Pattern Study of Malicious Codes},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {26--41},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008010102},
  doi          = {10.4018/JISP.2008010102},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/WeiRZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/WilsonDC08,
  author       = {E. Vance Wilson and
                  David D. Dobrzykowski and
                  Joseph A. Cazier},
  title        = {The Influence of Media Trust and Internet Trust on Privacy-Risking
                  Uses of E-Health},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {84--97},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008070107},
  doi          = {10.4018/JISP.2008070107},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisp/WilsonDC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/Yadav08,
  author       = {Surya B. Yadav},
  title        = {{SEACON:} An Integrated Approach to the Analysis and Design of Secure
                  Enterprise Architecture-Based Computer Networks},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {1--25},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008010101},
  doi          = {10.4018/JISP.2008010101},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/Yadav08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/YangPNE08,
  author       = {Li Yang and
                  Chang Phuong and
                  Amy Novobilski and
                  Raimund K. Ege},
  title        = {Trust-Based Usage Control in Collaborative Environment},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {2},
  pages        = {31--45},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008040103},
  doi          = {10.4018/JISP.2008040103},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/YangPNE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/YangPR08,
  author       = {Li Yang and
                  Lu Peng and
                  Balachandran Ramadass},
  title        = {SecCMP: Enhancing Critical Secrets Protection in Chip-Multiprocessors},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {2},
  number       = {4},
  pages        = {54--66},
  year         = {2008},
  url          = {https://doi.org/10.4018/jisp.2008100103},
  doi          = {10.4018/JISP.2008100103},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/YangPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics