Volume 3

October 2014, Volume 3, Number 5

A Provenance-Policy Based Access Control Model for Data Usage Validation in Cloud
Muralikrishnan Ramane, Balaji Vasudevan and Sathappan Allaphan, University College of Engineering Villupuram, India

August 2014, Volume 3, Number 4

The Conceptual Idea of Online Social Media site(SMS) User Account Penetration Testing System
Sabarathinam Chockalingam and Harjinder Singh Lallie, University of Warwick, United Kingdom

June 2014, Volume 3, Number 3

Error Performance of JPEG and Watermark Authentication Techniques in Wireless Sensor Network
Mohammad Abdus Salam and Hesham Elashhab, Southern University, USA

April 2014, Volume 3, Number 2

The Examination of Relation Between Organizational Space and Organizational Patronage
Fariba Azizzadeh, Islamic Azad University, Iran

Cross-Domain Identity Trust Management for Grid Computing
Amr Farouk, Mohamed M. Fouad and Ahmed A. Abdelhafez, Military Technical College, Egypt

February 2014, Volume 3, Number 1

The Relationship between Organizational Space of Offices and Corporate Identity (Case Study: General Offices in Azerbaijan)
Mehran Moulavi, Parivash Mohammadi, Hassan Zirak and Fariba Azizzadeh, Islamic Azad University, Iran

A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain
Debiprasad Bandyopadhyay1, Kousik Dasgupta1, J. K. Mandal2 and Paramartha Dutta3, 1Kalyani Government Engineering
College, India, 2Kalyani University, India and 3Visva-Bharati University, India

Analysis and Improvement of Pairing-Free Certificate-Less Two-Party Authenticated Key Agreement Protocol for Grid
Computing

Amr Farouk, Mohamed M. Fouad and Ahmed A. Abdelhafez, Military Technical College, Egypt