1 | -- | 3 | Igor V. Kotenko. Guest Editorial: Security in Distributed and Network-Based Computing |
4 | -- | 20 | Giuseppe Cicotti, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano. Runtime Model Checking for SLA Compliance Monitoring and QoS Prediction |
21 | -- | 40 | Roland Rieke, Maria Zhdanova, Jürgen Repp. Security Compliance Tracking of Processes in Networked Cooperating Systems |
41 | -- | 57 | Andrey Fedorchenko, Igor V. Kotenko, Andrey Chechulin. Integrated Repository of Security Information for Network Security Evaluation |
58 | -- | 77 | Fabrizio Baiardi, Federico Tonelli, Alessandro Bertolini, Roberto Bertolotti. Selecting Countermeasures for ICT Systems Before They are Attacked |
78 | -- | 97 | Anastasia Skovoroda, Dennis Gamayunov. Securing mobile devices: malware mitigation methods |
98 | -- | 112 | Lewis Nkenyereye, Bayu Adhi Tama, Youngho Park 0004, Kyung Hyune Rhee. A Fine-Grained Privacy Preserving Protocol over Attribute Based Access Control for VANETs |
113 | -- | 121 | Sehrish Malik, Jong-Hyouk Lee. Privacy Enhancing Factors in People-Nearby Applications |