1598 | -- | 1607 | Daniel Mellado, David G. Rosado. An Overview of Current Information Systems Security Challenges and Innovations |
1608 | -- | 1627 | Haralambos Mouratidis, Christos Kalloniatis, Shareeful Islam, Marc-Philippe Huget, Stefanos Gritzalis. Aligning Security and Privacy to Support the Development of Secure Information Systems |
1628 | -- | 1642 | Rahul Rastogi, Rossouw von Solms. Information Security Service Culture - Information Security for End-users |
1643 | -- | 1661 | Pedro Martinez-Julia, Antonio F. Gómez-Skarmeta. A Novel Identity-based Network Architecture for Next Generation Internet |
1662 | -- | 1678 | Thijs Baars, Marco Spruit. Analysing the Security Risks of Cloud Adoption Using the SeCA Model: A Case Study |
1679 | -- | 1702 | Reijo M. Savola, Christian Frühwirth, Ari Pietikäinen. Risk-Driven Security Metrics in Agile Software Development - An Industrial Pilot Study |
1703 | -- | 720 | Ismael Caballero, Luís Enrique Sanchez, Alberto Freitas, Eduardo Fernández-Medina. HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management |
1721 | -- | 1740 | Sipho Ngobeni, Hein S. Venter, Ivan Burke. The Modelling of a Digital Forensic Readiness Approach for Wireless Local Area Networks |
1741 | -- | 756 | Lin Ding, Jie Guan, Wen-long Sun. New Results of Related-key Attacks on All Py-Family of Stream Ciphers |