ANALYSIS OF CORE DOCUMENTS IN INFORMATION SECURITY BASED ON MAPPING KNOWLEDGE DOMAINS

Hong-zhou Shen, Qin-jian Yuan, Qian-jin Zong, Ling-yu Tong

Abstract

It has been gradually realized that the research of Information Security should beyond the only perspective of technology, but from a perspective of inter-discipline. However, researchers belonging to a certain discipline often seem to have a poor awareness of the contributions made by researchers in other disciplines. In order to help researchers fully understand the contributions made by researchers in other disciplines, this paper, with the method of Mapping Knowledge Domains, identifies four clusters of core documents that get more attention and analyze the contents of core documents in each cluster. Finally, there is also an analysis on evolution of these core documents in this paper.

References

  1. Campbell, K., Gordon, L. A., Loeb, M. P. and Zhou, L. (2003). The economic cost of publicly announced information security breaches: empirical evidence from the stock market. Journal of Computer Security, 11, 431-448.
  2. Cavusoglu, H., Mishra, B. and Raghunathan, S. (2004). A Model for Evaluating IT Security Investments. Communications of the ACM, 47(7), 87-92.
  3. Denning D. E. (1976). A Lattice Model of Secure Information Flow. Communications of the ACM, 19(5), 236-243.
  4. Dhillon, G. and Backhouse, J. (2001). Current directions in IS security research: towards socio-organizational perspectives. Information systems journal, 11(2), 127- 154.
  5. Dhillon, G. and Backhouse, J. (2000). Information System Security Management in the New Millennium. Communications of the ACM, 43(7), 125-128.
  6. Diffie, W. and Hellman, M. E. (1976). New Directions in Cryptography. IEEE Transactions on Information Theory, 12(6), 644-654.
  7. Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R. and Chandramouli, R. (2001). Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 4(3), 224-274.
  8. Fulford, H. and Doherty, N. F. (2003). The application of information security policies in large UK-based organizations: an exploratory investigation. Information Management & Computer Security, 11(3), 106-114.
  9. Gordon L. A. and Loeb M. P. (2002). The Economics of Information Security Investment. ACM Transactions on Information and System Security, 5(4), 438-457.
  10. Höne, K. and Eloff J. H. P. (2002). What Makes an Effective Information Security Policy. Network Security, 6, 14-16.
  11. Javidi, B. and Nomura, T. (2000). Securing information by use of digital holography. Optics Letters, 25(1), 28-30.
  12. Koblitz, N. (1987). Elliptic Curve Cryptosystems. Mathematics of Computation, 48(177), 203-209.
  13. Matoba, O. and Javidi, B. (1999). Encrypted optical memory system using three-dimensional keys in the Fresnel domain. Optics Letters, 24(11), 762-764.
  14. Myers, A. C. and Liskov, B. (2000). Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering and Methodology, 9(4), 410-442.
  15. Refregier, P. and Javidi, B. (1995). Optical image encryption based on input plane and Fourier plane random encoding. Optics Letters, 20(7), 767-769.
  16. Rivest, R. L., Shamir, A. and Adleman, L. (1978). A Method for Obtaining Digital Signatures and PublicKey Cryptosystems. Communications of the ACM, 21(2), 120-126.
  17. Samarati, P., Bertino, E., Ciampichetti, A. and Jajodia, S. (1997). Information Flow Control in Object-Oriented Systems. IEEE Transactions on Knowledge and Data Engineering, 9(4), 524-538.
  18. Sandhu, R. S., Coynek, E. J., Feinsteink, H. L. and Youmank, C. E. (1996). Role-Based Access Control Models. IEEE Computer, 29(2), 38-47.
  19. Shamir, A. (1979). How to Share a Secret. Communications of the ACM, 22(11), 612-613.
  20. Shiffrin R. M., Borner K. (2004). Mapping knowledge domains. Proceedings of the National Academy of Sciences of the USA, 101(suppl.1), 5183-5185.
  21. Situ,G. and Zhang, J. (2004). Double random-phase encoding in the Fresnel domain. Optics Letters, 29(14), 1584-1586.
  22. Small, H. (1973). Co-citation in the scientific literature: A new measure of the relationship between two documents. Journal of the American Society for Information Science, 24, 265-269.
  23. Stanton, J. M., Stam, K. R., Mastrangelo, P. and Jolton, J. (2005). Analysis of end user security behaviours. Computers & Security, 24, 124-133.
  24. Straub, D. W. (1990). Effective IS Security: An Empirical Study. Information System Research, 1(3), 255-276.
  25. Straub, D. W. and Welke, R. J. (1998). Coping With Systems Risk: Security Planning Models for Management Decision Making. MIS Quarterly, 22(4), 441-469.
  26. Unnikrishnan, G., Joseph, J. and Singh, K. (2000). Optical encryption by double-random phase encoding in the fractional Fourier domain. Optics Letters, 25(12), 887- 889.
  27. Wikipedia. Information Security. Retrieved March 24, 2011, from http://en.wikipedia.org/wiki/Information_Security Wikipedia. Citation Analysis. Retrieved March 24, 2011, from http://en.wikipedia.org/wiki/Citation_analysis Yasuda, M., Tachikawa, T. and Takizawa, M. (1998). A purpose-oriented access control model. Proceedings of the 13th International Conference on Information Networking, 168-173.
Download


Paper Citation


in Harvard Style

Shen H., Yuan Q., Zong Q. and Tong L. (2011). ANALYSIS OF CORE DOCUMENTS IN INFORMATION SECURITY BASED ON MAPPING KNOWLEDGE DOMAINS . In Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: EIT, (ICEIS 2011) ISBN 978-989-8425-55-3, pages 421-427. DOI: 10.5220/0003576704210427


in Bibtex Style

@conference{eit11,
author={Hong-zhou Shen and Qin-jian Yuan and Qian-jin Zong and Ling-yu Tong},
title={ANALYSIS OF CORE DOCUMENTS IN INFORMATION SECURITY BASED ON MAPPING KNOWLEDGE DOMAINS},
booktitle={Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: EIT, (ICEIS 2011)},
year={2011},
pages={421-427},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003576704210427},
isbn={978-989-8425-55-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: EIT, (ICEIS 2011)
TI - ANALYSIS OF CORE DOCUMENTS IN INFORMATION SECURITY BASED ON MAPPING KNOWLEDGE DOMAINS
SN - 978-989-8425-55-3
AU - Shen H.
AU - Yuan Q.
AU - Zong Q.
AU - Tong L.
PY - 2011
SP - 421
EP - 427
DO - 10.5220/0003576704210427