89 | -- | 96 | P. G. Dorey, A. Leite. Commentary: Cloud computing - A security problem or solution? |
97 | -- | 101 | Piers Wilson. Positive perspectives on cloud security |
102 | -- | 107 | David Teneyuca. Internet cloud security: The illusion of inclusion |
108 | -- | 114 | Imad M. Abbadi, Andrew Martin. Trust in the Cloud |
115 | -- | 122 | Lizzie Coles-Kemp, Joseph Reddington, Patricia A. H. Williams. Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud |
123 | -- | 130 | Zaheer Ahmad, Keith Mayes, Song Dong, Konstantinos Markantonakis. Considerations for mobile authentication in the Cloud |
131 | -- | 141 | Ulrich Lang, Rudolf Schreiner. Analysis of recommended cloud security controls to validate OpenPMF "policy as a service" |
142 | -- | 149 | André van Cleeff, Wolter Pieters, Roel Wieringa, Frits van Tiel. Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization |