美国科研出版社期刊
期刊
会议
图书
作者:Kambombo Mtonga , Eun Jun Yoon , Hyun Sung Kim
来源:[J].Journal of Information Security, 2017, Vol.08 (01), pp.75-90Scientific Research Publishing
摘要:The digitization of patient health information has brought many benefits and challenges for both the patients and physicians. However, security and privacy preservation have remained important challenges for remote health monitoring systems. Since a patient’s health informat...
作者:Kato Mivule
来源:[J].Journal of Information Security, 2017, Vol.08 (01), pp.56-74Scientific Research Publishing
摘要:While search engines have become vital tools for searching information on the Internet, privacy issues remain a growing concern due to the technological abilities of search engines to retain user search logs. Although such capabilities might provide enhanced personalized sea...
作者:Sasith M. Rajasooriya , Chris. P. Tsokos , Pubudu Kalpani Kaluarachchi
来源:[J].Journal of Information Security, 2017, Vol.08 (02), pp.125-140Scientific Research Publishing
摘要:Obtaining complete information regarding discovered vulnerabilities looks extremely difficult. Yet, developing statistical models requires a great deal of such complete information about the vulnerabilities. In our previous studies, we introduced a new concept of “Risk Facto...
作者:Hoang Giang Do , Wee Keong Ng
来源:[J].Journal of Information Security, 2017, Vol.08 (03), pp.223-239Scientific Research Publishing
摘要:Physical document verification is a necessary task in the process of reviewing applications for a variety of services, such as loans, insurance, and mortgages. This process consumes a large amount of time, money, and human resources, which leads to limited business throughpu...
作者:Ali Abu Romman
来源:[J].Journal of Information Security, 2017, Vol.08 (01), pp.8-22Scientific Research Publishing
摘要:The nature of crime has dramatically changed after the revolution of the new digital era. It is no longer based on violence but on the criminal computer abilities and technical expertise. This paper presents a comprehensive comparison between the Jordanian digital law 2015 and th...
作者:S. K. Mahama Ewurah
来源:[J].Journal of Information Security, 2017, Vol.08 (02), pp.106-124Scientific Research Publishing
摘要:It is obvious that no government or business operation can be done without some kinds of involvement of ICTs in the process. However, research shows that, the policies and implementation of ICTs in delivering public services face several challenges in different countries due to c...
作者:Maduhu Mshangi , Edephonce Ngemera Nfuka , Camilius Sanga
来源:[J].Journal of Information Security, 2017, Vol.08 (03), pp.141-165Scientific Research Publishing
摘要:This paper presents an innovative Soft Design Science Methodology for improving information systems security using multi-layered security approach. The study applied Soft Design Science Methodology to address the problematic situation on how information systems security can be im...
作者:Asma Alotaibi , Ahmed Barnawi , Mohammed Buhari
来源:[J].Journal of Information Security, 2017, Vol.08 (03), pp.203-222Scientific Research Publishing
摘要:Fog computing is a concept that extends the paradigm of cloud computing tothe network edge. The goal of fog computing is to situate resources in the vicinityof end users. As with cloud computing, fog computing provides storageservices. The data owners can store their confidential...
作者:Iorliam Aamo , Shangbum F. Caleb
来源:[J].Journal of Information Security, 2017, Vol.08 (03), pp.240-256Scientific Research Publishing
摘要:Tampering of biometric data has attracted a great deal of attention recently. Furthermore, there could be an intentional or accidental use of a particular biometric sample instead of another for a particular application. Therefore, there exists a need to propose a method to ...
作者:Rodney Alexander
来源:[J].Journal of Information Security, 2017, Vol.08 (03), pp.166-173Scientific Research Publishing
摘要:Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth i...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×