Open access peer-reviewed Edited Volume

Security Enhanced Applications for Information Systems

Edited by Christos Kalloniatis

University of the Aegean

Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users’ trust as well as the reputation of the system’s stakeholders. Designing and implementing security enhanced systems is of vital importance. Therefore, this book aims to present a number of innovative security enhanced applications. It is titled “Security Enhanced Applications for Information Systems” and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments.

Read more >Order hardcopy
Security Enhanced Applications for Information SystemsEdited by Christos Kalloniatis

Published: May 30th 2012

DOI: 10.5772/2345

ISBN: 978-953-51-0643-2

eBook (PDF) ISBN: 978-953-51-5631-4

Copyright year: 2012

Books open for chapter submissions

27027 Total Chapter Downloads

3 Crossref Citations

4 Web of Science Citations

11 Dimensions Citations


Open access peer-reviewed

1. Web and Database Security

By Jiping Xiong, Lifeng Xuan, Jian Zhao and Tao Huang


Open access peer-reviewed

2. Cyber Security

By Barry Lunt, Dale Rowe and Joseph Ekstrom


Open access peer-reviewed

3. Development of an e-Learning Recommender System Using Discrete Choice Models and Bayesian Theory: A Pilot Case in the Shipping Industry

By Amalia Polydoropoulou and Maria A. Lambrou


Open access peer-reviewed

4. Intrusion Detection and Prevention in High Speed Network

By Kuo Zhao and Liang Hu


Open access peer-reviewed

5. Challenges in Building Trusted Information Systems

By Serena Chan and Gregory N. Larsen


Open access peer-reviewed

6. Construction of Effective Database System for Information Risk Mitigation

By Kiyoshi Nagata


Open access peer-reviewed

7. Quality Model - Master Plan and DNA of an Information System

By Finne Auvo


Open access peer-reviewed

8. Services for the Digital Citizen

By Seppo Sirkemaa


Open access peer-reviewed

9. The Requirements for the Legal Regulation of Commercial Relations in Cloud Computing

By Ivan Pogarcic, Marko Pogarcic and Matej Pogarcic


Open access peer-reviewed

10. Developing a Theoretical Framework for the Adoption of Biometrics in M-Government Applications Using Grounded Theory

By Thamer Alhussain and Steve Drew


Open access peer-reviewed

11. Building Expert Profiles Models Applying Semantic Web Technologies

By Valentina Janev and Sanja Vraneš


Edited Volume and chapters are indexed in

  • Worldcat
  • OpenAIRE
  • Google Scholar
  • AZ ebsco
  • Base
  • CNKI

Order a hardcopy of the Edited Volume

Free shipping with DHL Express

Hardcover (ex. VAT)£119

Order now

Residents of European Union countries need to add a Book Value-Added Tax Rate based on their country of residence. Institutions and companies, registered as VAT taxable entities in their own EU member state, will not pay VAT by providing IntechOpen with their VAT registration number. This is made possible by the EU reverse charge method.

Special discount for IntechOpen contributors

All IntechOpen contributors are offered special discounts starting at 40% OFF available through your personal dashboard

Login and purchase

Related books