Asian Journal of Information Technology

Year: 2018
Volume: 17
Issue: 1
Page No. 14 - 22

Distributed Secure Information Flow Provenance Model Using BYOD to Control and Monitor Spurious Drugs

Authors : D. Vinod and S. Chandrasekaran

References

Ali, S.M., 2014. Integration of information security essential controls into information technology infrastructure library a proposed framework. Intl. J. Appl., 4: 95-100.
Direct Link  |  

Chapin, P.C., C. Skalka and X.S. Wang, 2008. Authorization in trust management: Features and foundations. ACM. Comput. Surv. (CSUR), Vol. 40, 10.1145/1380584.1380587

Gambetta, D., 2000. Can We Trust Trust? In: Trust Making and Breaking Cooperative Relations, Gambetta, D. (Ed.). Blackwell, Oxford, UK., pp: 213-237.

Hasan, R., R. Sion and M. Winslett, 2009. Preventing history forgery with secure provenance. ACM. Trans. Storage (TOS), Vol. 5, 10.1145/1629080.1629082

Jain, S.K., 2006. The spurious drug menance and remedy. Health Administrator, 19: 29-40.

Jeong, C. and S. Ahn, 2014. A study on the improvements of information security management system for environment education institutes. Intl. J. Secur. Appl., 8: 247-252.
Direct Link  |  

Juneja, M.D., M.K. Arora and M.S. Duggal, 2011. Developing security metrics for information security measurement system. Intl. J. Enterp. Comput. Bus. Syst., 1: 1-10.
Direct Link  |  

Lewis, R., P. Louvieris, P. Abbott, N. Clewley and K. Jones, 2014. Cybersecurity information sharing: A framework for information security management in UK SME supply chains. Proceedings of the 22nd European Conference on Information Systems, June, 9-11, 2014, Brunel University London, Uxbridge, England, pp: 1-15.

Tashi, I. and H.S. Ghernaouti, 2007. Security metrics to improve information security management. Proceedings of 6th Annual Conference on Security Conference, April 11-12, 2007, University of Lausanne, Lausanne, Switzerland, pp: 1-13.

Design and power by Medwell Web Development Team. © Medwell Publishing 2022 All Rights Reserved