Information Management & Computer Security: Volume 12 Issue 5

Subjects:

Table of contents

Formal definition and implementation of business‐oriented SoD access control policy

Wang Xing‐fen, Li Yi‐jun

Based on organizational task decomposition, an extensive role‐based access control (ERBAC) model is proposed in this paper. In ERBAC, the abstract concept of “permission” in…

Auditing in the e‐commerce era

Ning Zhao, David C. Yen, I‐Chiu Chang

Financial statements are not as important to investors as they once were, as technology has changed the way companies create value today. While these changes pose serious threats…

6893

A global information technology model: business applications in developing economies (case studies)

Mayur S. Desai, Kiran J. Desai, Lucy Ojode

This paper develops a global information technology model that captures the main drivers of a firm's IT applications in multiple markets with two illustrative company cases. The…

1658

Frequency‐ and ordering‐based similarity measure for host‐based intrusion detection

Sanjay Rawat, V.P. Gulati, Arun K. Pujari

This paper discusses a new similarity measure for the anomaly‐based intrusion detection scheme using sequences of system calls. With the increasing frequency of new attacks, it is…

Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid