Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013, Article ID 569562, 11 pages
Research Article

Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology

Department of Information Management, Chung Hua University, Section 2, 707 WuFu Road, Hsinchu 30012, Taiwan

Received 5 July 2013; Revised 11 October 2013; Accepted 15 October 2013

Academic Editor: Jung-Fa Tsai

Copyright © 2013 Mei-Yu Wu and Ming-Hsien Yu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [4 citations]

The following is the list of published articles that have cited the current article.

  • Donghee Choi, Dohoon Kim, and Seog Park, “A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems,” Computational and Mathematical Methods in Medicine, vol. 2015, pp. 1–9, 2015. View at Publisher · View at Google Scholar
  • Winfred Yaokumah, “Investigation into the State-of-Practice of Operations Security Management Based on ISO/IEC 27002,” International Journal of Technology Diffusion, vol. 7, no. 1, pp. 51–70, 2016. View at Publisher · View at Google Scholar
  • Winfred Yaokumah, and Peace Kumah, “Exploring the Impact of Security Policy on Compliance,” Global Implications of Emerging Technology Trends, pp. 256–274, 2018. View at Publisher · View at Google Scholar
  • Winfred Yaokumah, “Conceptualizing the Domain and an Empirical Analysis of Operations Security Management,” Handbook of Research on Technology Integration in the Global World, pp. 304–330, 2019. View at Publisher · View at Google Scholar