-------- Original-Nachricht -------- Betreff: [AISWorld] TOC: IJISP 4(2) Datum: Thu, 7 Oct 2010 10:13:18 -0400 Von: Hamid Nemati hrnemati@uncg.edu An: AISWorld@lists.aisnet.org
The contents of the latest issue of: International Journal of Information Security and Privacy (IJISP) Official Publication of the Information Resources Management Association Volume 4, Issue 2, April-June 2007 Published: Quarterly in Print and Electronically ISSN: 1930-1650 EISSN: 1930-1669 Published by IGI Publishing, Hershey-New York, USA www.igi-global.com/ijisp
Editor-in-Chief: Hamid Nemati, The University of North Carolina at Greensboro, USA
PAPER ONE Protecting User Privacy Better with Query l-Diversity
Fuyu Liu, University of Central Florida, USA Kien Hua, University of Central Florida, USA
This paper examines major privacy concerns in location-based services. Most user privacy techniques are based on cloaking, which achieves location k-anonymity. The key is to reduce location resolution by ensuring that each cloaking area reported to a service provider contains at least k mobile users. However, maintaining location k-anonymity alone is inadequate when the majority of the k mobile users are interested in the same query subject. In this paper, the authors address this problem by defining a novel concept called query l-diversity, which requires diversified queries submitted from the k users. The authors propose two techniques: Expand Cloak and Hilbert Cloak to achieve query l-diversity. To show the effectiveness of the proposed techniques, they compare the improved Interval Cloak technique through extensive simulation studies. The results show that these techniques better protect user privacy.
To obtain a copy of the entire article, click on the link below. http://igi-global.com/Bookstore/Article.aspx?TitleId=46100
PAPER TWO Globalization and Data Privacy: An Exploratory Study
Robert Totterdale, Robert Morris University, USA
Global organizations operate in multiple countries and are subject to both local and federal laws in each of the jurisdictions in which they conduct business. The collection, storage, processing, and transfer of data between countries or operating locations are often subject to a multitude of data privacy laws, regulations, and legal systems that are at times in conflict. Companies struggle to have the proper policies, processes, and technologies in place that will allow them to comply with a myriad of laws which are constantly changing. Using an established privacy management framework, this study provides a summary of major data privacy laws in the U.S., Europe, and India, and their implication for businesses. Additionally, in this paper, relationships between age, residence (country), attitudes and awareness of business rules and data privacy laws are explored for 331 business professionals located in the U.S and India.
To obtain a copy of the entire article, click on the link below. http://igi-global.com/Bookstore/Article.aspx?TitleId=46101
PAPER THREE Security Issues for Cloud Computing
Kevin Hamlen, The University of Texas at Dallas, USA Murat Kantarcioglu, The University of Texas at Dallas, USA Latifur Khan, The University of Texas at Dallas, USA Bhavani Thuraisingham, The University of Texas at Dallas, USA
In this paper, the authors discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage layer and the data layer. In particular, the authors discuss a scheme for secure third party publications of documents in a cloud. Next, the paper will converse secure federated query processing with map Reduce and Hadoop, and discuss the use of secure co-processors for cloud computing. Finally, the authors discuss XACML implementation for Hadoop and discuss their beliefs that building trusted applications from untrusted components will be a major aspect of secure cloud computing.
To obtain a copy of the entire article, click on the link below. http://igi-global.com/Bookstore/Article.aspx?TitleId=46102
PAPER FOUR
Global Information Security Factors Garry White, Texas State University - San Marcos, USA Ju Long, Texas State University - San Marcos, USA
The Internet has changed security and because the Internet is borderless, security threats are now on a global scale. In this paper, the authors explore the global nature of information security from the perspectives of corporate professionals. Through an empirical study with corporate professionals, who have first-hand information security knowledge, the authors confirm that the proposed knowledge topics are relevant toward a comprehensive understanding of information security issues. Analyzing the empirical data, the authors found two global security factors: business protection of data and government/social issues.
To obtain a copy of the entire article, click on the link below. http://igi-global.com/Bookstore/Article.aspx?TitleId=46103
***************************************************** For full copies of the above articles, check for this issue of the International Journal of Information Security and Privacy (IJISP) in your institution's library. This journal is also included in the IGI Global aggregated "InfoSci-Journals" database: http://www.igi-global.com/EResources/InfoSciJournals.aspx. *****************************************************
CALL FOR PAPERS
Mission of IJISP:
The overall mission of the International Journal of Information Security and Privacy (IJISP) is to create and foster a forum where research in the theory and practice of information security and privacy is advanced. The journal strives to serve a diverse readership by publishing articles in a range of topics in information security and privacy that would appeal to a broad cross-sectional and multi disciplinary readership ranging from the academic and professional research communities to industry practitioners. The journal seeks to publish a balanced mix of high quality theoretical or empirical research articles, case studies, book reviews, tutorials, editorials as well as pedagogical and curricular issues surrounding information security and privacy.
Coverage of IJISP:
The International Journal of Information Security and Privacy (IJISP) publishes a full spectrum of high quality papers dealing with a wide range of issues, ranging from technical, regulatory, organizational, managerial, cultural, ethical, and human aspects of information security and privacy. This journal encourages submission of manuscripts that present research frameworks, methods, methodologies, theory development and validation, case studies, simulation results and analysis, technological architectures, and infrastructure issues in design, and implementation and maintenance of secure and privacy preserving initiatives.
In addition to the topics mentioned above, other topics of interest to the journal include (but are not limited to) the following:
Agents and mobile communication systems Authentication and authorization of users, systems, and applications Businesses models and systems with security and privacy requirements and management Case studies in security and privacy Civil rights and liberties Computer worms and viruses Consumer and business practices and trends Cryptographic techniques and protocols Database issues in privacy protection Developing enterprise management of security and privacy policies and infrastructures Development of formal models and definitions Distributed, forward, and proactive policies and procedures Distributed marketplaces, auctions, and gaming Economic impact analysis Electronic commerce, banking, and payment protocols Encryption, authentication, and access control Enhancements for Storage Area Networks E-services, e-voting, and e-government File and file system security and privacy Firewall technologies, policies, and trends Global issues Hacking and corruptions Hacking, cyber-terrorism, and intrusion detection Heterogeneous and large-scale environments Identity and privacy confidentiality Legal, regulatory, and compliance issues Malicious codes and attacks against networks Multiparty communications, co-operations, and computations Networks and security protocols Peer-to-Peer computing Preserving and enhancing technologies and initiatives Relationships and trade-offs between security and privacy Security and privacy techniques, management, and protocols Tools, techniques, methods, and frameworks Trends and new developments Trust architectures and underlying infrastructures World Wide Web authentication and authorization
Interested authors should consult the journal's manuscript submission guidelines at www.igi-global.com/ijisp
All inquiries and submissions should be sent to: Editor-in-Chief: Hamid Nemati at Nemati@uncg.edu
_______________________________________________ AISWorld mailing list AISWorld@lists.aisnet.org