| 7 | -- | 8 | Charles Severance. Bruce Schneier: The Security Mindset |
| 9 | -- | 0 | Elisa Bertino. Securing Mobile Applications |
| 12 | -- | 13 | Schahram Dustdar. Cloud Computing |
| 14 | -- | 22 | Fernando Díaz del Río, Javier Salmerón-Garcia, José Luis Sevillano. Extending Amdahl's Law for the Cloud Computing Era |
| 24 | -- | 33 | Alireza Khoshkbarforoushha, Meisong Wang, Rajiv Ranjan, Lizhe Wang, Leila Alem, Samee Ullah Khan, Boualem Benatallah. Dimensions for Evaluating Cloud Resource Orchestration Frameworks |
| 34 | -- | 45 | Talal H. Noor, Quan Z. Sheng, Zakaria Maamar, Sherali Zeadally. Managing Trust in the Cloud: State of the Art and Research Challenges |
| 46 | -- | 52 | Quan Zhang, Weisong Shi. Energy-Efficient Workload Placement in Enterprise Datacenters |
| 54 | -- | 62 | Lei Xu, Chunxiao Jiang, Yan Chen, Jian Wang, Yong Ren. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining |
| 63 | -- | 67 | Hal Berghel. Secretocracy |
| 68 | -- | 72 | Mahmoud Barhamgi, Arosha K. Bandara, Yijun Yu, Khalid Belhajjame, Bashar Nuseibeh. Protecting Privacy in the Cloud: Current Practices, Future Directions |
| 74 | -- | 77 | Nir Kshetri. Gambling with Source Code |
| 78 | -- | 79 | Brian David Johnson, David H. Guston. Futures We Want to Inhabit |
| 80 | -- | 86 | Vint Cerf, Max Senges. Taking the Internet to the Next Physical Level |
| 104 | -- | 0 | David Alan Grier. The Post-MOOC World |