-------- Original-Nachricht --------
Betreff: [AISWorld] TOC: IJISP 4(2)
Datum: Thu, 7 Oct 2010 10:13:18 -0400
Von: Hamid Nemati <hrnemati@uncg.edu>
An: AISWorld@lists.aisnet.org


The contents of the latest issue of:  International Journal of
Information Security and Privacy (IJISP)
Official Publication of the Information Resources Management Association
Volume 4, Issue 2, April-June 2007
Published: Quarterly in Print and Electronically
ISSN: 1930-1650 EISSN: 1930-1669
Published by IGI Publishing, Hershey-New York, USA
www.igi-global.com/ijisp

Editor-in-Chief: Hamid Nemati, The University of North Carolina at
Greensboro, USA

PAPER ONE
Protecting User Privacy Better with Query l-Diversity

Fuyu Liu, University of Central Florida, USA
Kien Hua, University of Central Florida, USA

This paper examines major privacy concerns in location-based services.
Most user privacy techniques are based on cloaking, which achieves
location k-anonymity. The key is to reduce location resolution by
ensuring that each cloaking area reported to a service provider
contains at least k mobile users. However, maintaining location
k-anonymity alone is inadequate when the majority of the k mobile
users are interested in the same query subject. In this paper, the
authors address this problem by defining a novel concept called query
l-diversity, which requires diversified queries submitted from the k
users. The authors propose two techniques: Expand Cloak and Hilbert
Cloak to achieve query l-diversity. To show the effectiveness of the
proposed techniques, they compare the improved Interval Cloak
technique through extensive simulation studies. The results show that
these techniques better protect user privacy.

To obtain a copy of the entire article, click on the link below.
http://igi-global.com/Bookstore/Article.aspx?TitleId=46100

PAPER TWO
 Globalization and Data Privacy: An Exploratory Study

Robert Totterdale, Robert Morris University, USA

Global organizations operate in multiple countries and are subject to
both local and federal laws in each of the jurisdictions in which they
conduct business. The collection, storage, processing, and transfer of
data between countries or operating locations are often subject to a
multitude of data privacy laws, regulations, and legal systems that
are at times in conflict. Companies struggle to have the proper
policies, processes, and technologies in place that will allow them to
comply with a myriad of laws which are constantly changing. Using an
established privacy management framework, this study provides a
summary of major data privacy laws in the U.S., Europe, and India, and
their implication for businesses. Additionally, in this paper,
relationships between age, residence (country), attitudes and
awareness of business rules and data privacy laws are explored for 331
business professionals located in the U.S and India.

To obtain a copy of the entire article, click on the link below.
http://igi-global.com/Bookstore/Article.aspx?TitleId=46101

PAPER THREE
Security Issues for Cloud Computing

Kevin Hamlen, The University of Texas at Dallas, USA
Murat Kantarcioglu, The University of Texas at Dallas, USA
Latifur Khan, The University of Texas at Dallas, USA
Bhavani Thuraisingham, The University of Texas at Dallas, USA


In this paper, the authors discuss security issues for cloud computing
and present a layered framework for secure clouds and then focus on
two of the layers, i.e., the storage layer and the data layer. In
particular, the authors discuss a scheme for secure third party
publications of documents in a cloud. Next, the paper will converse
secure federated query processing with map Reduce and Hadoop, and
discuss the use of secure co-processors for cloud computing. Finally,
the authors discuss XACML implementation for Hadoop and discuss their
beliefs that building trusted applications from untrusted components
will be a major aspect of secure cloud computing.

To obtain a copy of the entire article, click on the link below.
http://igi-global.com/Bookstore/Article.aspx?TitleId=46102

PAPER FOUR

Global Information Security Factors
Garry White, Texas State University - San Marcos, USA
Ju Long, Texas State University - San Marcos, USA


The Internet has changed security and because the Internet is
borderless, security threats are now on a global scale. In this paper,
the authors explore the global nature of information security from the
perspectives of corporate professionals. Through an empirical study
with corporate professionals, who have first-hand information security
knowledge, the authors confirm that the proposed knowledge topics are
relevant toward a comprehensive understanding of information security
issues. Analyzing the empirical data, the authors found two global
security factors: business protection of data and government/social
issues.

To obtain a copy of the entire article, click on the link below.
http://igi-global.com/Bookstore/Article.aspx?TitleId=46103

*****************************************************
For full copies of the above articles, check for this issue of the
International Journal of Information Security and Privacy (IJISP) in
your institution's library.  This journal is also included in the IGI
Global aggregated "InfoSci-Journals" database:
http://www.igi-global.com/EResources/InfoSciJournals.aspx.
*****************************************************

CALL FOR PAPERS

Mission of IJISP:

The overall mission of the International Journal of Information
Security and Privacy (IJISP) is to create and foster a forum where
research in the theory and practice of information security and
privacy is advanced. The journal strives to serve a diverse readership
by publishing articles in a range of topics in information security
and privacy that would appeal to a broad cross-sectional and multi
disciplinary readership ranging from the academic and professional
research communities to industry practitioners. The journal seeks to
publish a balanced mix of high quality theoretical or empirical
research articles, case studies, book reviews, tutorials, editorials
as well as pedagogical and curricular issues surrounding information
security and privacy.

Coverage of IJISP:

The International Journal of Information Security and Privacy (IJISP)
publishes a full spectrum of high quality papers dealing with a wide
range of issues, ranging from technical, regulatory, organizational,
managerial, cultural, ethical, and human aspects of information
security and privacy. This journal encourages submission of
manuscripts that present research frameworks, methods, methodologies,
theory development and validation, case studies, simulation results
and analysis, technological architectures, and infrastructure issues
in design, and implementation and maintenance of secure and privacy
preserving initiatives.

In addition to the topics mentioned above, other topics of interest to
the journal include (but are not limited to) the following:

Agents and mobile communication systems
Authentication and authorization of users, systems, and applications
Businesses models and systems with security and privacy requirements
and management
Case studies in security and privacy
Civil rights and liberties
Computer worms and viruses
Consumer and business practices and trends
Cryptographic techniques and protocols
Database issues in privacy protection
Developing enterprise management of security and privacy policies and
infrastructures
Development of formal models and definitions
Distributed, forward, and proactive policies and procedures
Distributed marketplaces, auctions, and gaming
Economic impact analysis
Electronic commerce, banking, and payment protocols
Encryption, authentication, and access control
Enhancements for Storage Area Networks
E-services, e-voting, and e-government
File and file system security and privacy
Firewall technologies, policies, and trends
Global issues
Hacking and corruptions
Hacking, cyber-terrorism, and intrusion detection
Heterogeneous and large-scale environments
Identity and privacy confidentiality
Legal, regulatory, and compliance issues
Malicious codes and attacks against networks
Multiparty communications, co-operations, and computations
Networks and security protocols
Peer-to-Peer computing
Preserving and enhancing technologies and initiatives
Relationships and trade-offs between security and privacy
Security and privacy techniques, management, and protocols
Tools, techniques, methods, and frameworks
Trends and new developments
Trust architectures and underlying infrastructures
World Wide Web authentication and authorization

Interested authors should consult the journal's manuscript submission
guidelines at www.igi-global.com/ijisp

All inquiries and submissions should be sent to:
Editor-in-Chief: Hamid Nemati at Nemati@uncg.edu

_______________________________________________
AISWorld mailing list
AISWorld@lists.aisnet.org