| 4 | -- | 5 | Mazin Yousif. In Pursuit of Disciplined Execution |
| 6 | -- | 8 | K. Selcuk Candan, Christian S. Jensen, Manish Parashar, Kyung Dong Ryu, Heonyoung Yeom. Cloud Engineering [Guest editors' introduction] |
| 10 | -- | 18 | Stefan Berger, Kenneth A. Goldman, Dimitrios E. Pendarakis, David Safford, Enriquillo Valdez, Mimi Zohar. Scalable Attestation: A Step toward Secure and Trusted Clouds |
| 20 | -- | 29 | Rohit Ranchal, Ajay Mohindra, Justin Manweiler, Bharat K. Bhargava. RADical Strategies for Engineering Web-Scale Cloud Solutions |
| 30 | -- | 38 | John T. Saxon, Behzad Bordbar, Keith Harrison. Introspecting for RSA Key Material to Assist Intrusion Detection |
| 40 | -- | 47 | Joe Weinman. Intercloudonomics: Quantifying the Value of the Intercloud |
| 48 | -- | 52 | Melvin Greer. FITARA and FedRAMP: Accelerating Federal Cloud Adoption |
| 54 | -- | 62 | Wenyi Chen, Anup Mohan, Yung-Hsiang Lu, Thomas J. Hacker, Wei Tsang Ooi, Edward J. Delp. Analysis of Large-Scale Distributed Cameras Using the Cloud |
| 64 | -- | 69 | Elisa Bertino, Surya Nepal, Rajiv Ranjan. Building Sensor-Based Big Data Cyberinfrastructures |
| 70 | -- | 74 | Colette Langos, Mark Giancaspro. Does Cloud Storage Lend Itself to Cyberbullying? |
| 76 | -- | 80 | Alan Sill. When to Use Standards-Based APIs (Part 1) |