Journal: Inf. Sec. Techn. Report

Volume 16, Issue 3-4

89 -- 96P. G. Dorey, A. Leite. Commentary: Cloud computing - A security problem or solution?
97 -- 101Piers Wilson. Positive perspectives on cloud security
102 -- 107David Teneyuca. Internet cloud security: The illusion of inclusion
108 -- 114Imad M. Abbadi, Andrew Martin. Trust in the Cloud
115 -- 122Lizzie Coles-Kemp, Joseph Reddington, Patricia A. H. Williams. Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud
123 -- 130Zaheer Ahmad, Keith Mayes, Song Dong, Konstantinos Markantonakis. Considerations for mobile authentication in the Cloud
131 -- 141Ulrich Lang, Rudolf Schreiner. Analysis of recommended cloud security controls to validate OpenPMF "policy as a service"
142 -- 149André van Cleeff, Wolter Pieters, Roel Wieringa, Frits van Tiel. Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization

Volume 16, Issue 2

37 -- 0Paul A. Watters. Social networking threats
38 -- 43George R. S. Weir, Fergus Toolan, Duncan N. Smeed. The threats of social networking: Old wine in new bottles?
44 -- 50Ethel Quayle, Max Taylor. Social networking as a nexus for engagement and exploitation of young people
51 -- 58Mofakharul Islam, Paul Andrew Watters, John Yearwood. Real-time detection of children's skin on social networking sites using Markov random field modelling
59 -- 66Gaurav Gupta, Josef Pieprzyk, Len Hamey. Bucket attack on numeric set watermarking model and safeguards
67 -- 73Gaurav Gupta, Josef Pieprzyk. Socio-technological phishing prevention
74 -- 78Man Qi, Denis Edgar-Nevill. Social networking searching and privacy issues
79 -- 87Paul Andrew Watters, Robert Layton, Richard Dazeley. How much material on BitTorrent is infringing content? A case study

Volume 16, Issue 1

1 -- 2Stephen D. Wolthusen. Next generation networks
3 -- 11Serap Atay, Marcelo Masera. Challenges for the security analysis of Next Generation Networks
12 -- 19Yacine Rebahi, Mohamed Nassar, Thomas Magedanz, Olivier Festor. A survey on fraud and service misuse in voice over IP (VoIP) networks
20 -- 28Claudio Mazzariello, Paolo De Lutiis, Dario Lombardo. Clustering NGN user behavior for anomaly detection
29 -- 35Ge Zhang, Yacine Rebahi. Side effects of identity management in SIP VoIP environment