Ausgabe 1/2013
Special Section on Security Management and Technologies for Protecting Against Internal Data Leakages
Inhalt (11 Artikel)
Guest editorial: A brief overview of data leakage and insider threats
Carly L. Huth, David W. Chadwick, William R. Claycomb, Ilsun You
Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise
Howard Chivers, John A. Clark, Philip Nobles, Siraj A. Shaikh, Hao Chen
Two-stage database intrusion detection by combining multiple evidence and belief update
Suvasini Panigrahi, Shamik Sural, Arun K. Majumdar
Application of density-based outlier detection to database activity monitoring
Seung Kim, Nam Wook Cho, Young Joo Lee, Suk-Ho Kang, Taewan Kim, Hyeseon Hwang, Dongseop Mun
Investigating the role of an enterprise architecture project in the business-IT alignment in Iran
Morteza Alaeddini, Sepideh Salekfard
A collaborative platform for buyer coalition: Introducing the Awareness-based Buyer Coalition (ABC) system
Laor Boongasame, Farhad Daneshgar
PadSpace: A new framework for the service federation of web resources
Damdinsuren Lkhamsuren, Yuzuru Tanaka
Comment on Lee et al.’s group signature and e-auction scheme
Yanbin Sun, Yan Sun, Mingxing Luo, Lize Gu, Shihui Zheng, Yixian Yang