Asian Journal of Information Technology
14 - 22
Distributed Secure Information Flow Provenance Model Using BYOD to
Control and Monitor Spurious Drugs
Ali, S.M., 2014. Integration of information security essential controls into information technology infrastructure library a proposed framework. Intl. J. Appl., 4: 95-100.
Chapin, P.C., C. Skalka and X.S. Wang, 2008. Authorization in trust management: Features and foundations. ACM. Comput. Surv. (CSUR), Vol. 40, 10.1145/1380584.1380587
Gambetta, D., 2000. Can We Trust Trust? In: Trust Making and Breaking Cooperative Relations, Gambetta, D. (Ed.). Blackwell, Oxford, UK., pp: 213-237.
Hasan, R., R. Sion and M. Winslett, 2009. Preventing history forgery with secure provenance. ACM. Trans. Storage (TOS), Vol. 5, 10.1145/1629080.1629082
Jain, S.K., 2006. The spurious drug menance and remedy. Health Administrator, 19: 29-40.
Jeong, C. and S. Ahn, 2014. A study on the improvements of information security management system for environment education institutes. Intl. J. Secur. Appl., 8: 247-252.Direct Link |
Juneja, M.D., M.K. Arora and M.S. Duggal, 2011. Developing security metrics for information security measurement system. Intl. J. Enterp. Comput. Bus. Syst., 1: 1-10.Direct Link |
Lewis, R., P. Louvieris, P. Abbott, N. Clewley and K. Jones, 2014. Cybersecurity information sharing: A framework for information security management in UK SME supply chains. Proceedings of the 22nd European Conference on Information Systems, June, 9-11, 2014, Brunel University London, Uxbridge, England, pp: 1-15.
Tashi, I. and H.S. Ghernaouti, 2007. Security metrics to improve information security management. Proceedings of 6th Annual Conference on Security Conference, April 11-12, 2007, University of Lausanne, Lausanne, Switzerland, pp: 1-13.