Volume 3
October 2014, Volume 3, Number 5
| A Provenance-Policy Based Access Control Model for Data Usage Validation in Cloud  | 
August 2014, Volume 3, Number 4
| The Conceptual Idea of Online Social Media site(SMS) User Account Penetration Testing System  | 
June 2014, Volume 3, Number 3
| Error Performance of JPEG and Watermark Authentication Techniques in Wireless Sensor Network | 
