Abstract is missing.
- Cloud security ecosystemRyan K. L. Ko, Kim-Kwang Raymond Choo. 1-14 [doi]
- Cybercrime in cloud: Risks and responses in Hong Kong, SingaporeYiu Chung Laurie Lau. 17-35 [doi]
- CATRA: Conceptual cloud attack taxonomy and risk assessment frameworkNina Viktoria Juliadotter, Kim-Kwang Raymond Choo. 37-81 [doi]
- Multitiered cloud security modelHing-Yan Lee, Yao-Sing Tao. 83-97 [doi]
- A guide to homomorphic encryptionMark A. Will, Ryan K. L. Ko. 101-127 [doi]
- Protection through isolation: Virtues and pitfallsJohanna Ullrich, Edgar R. Weippl. 129-147 [doi]
- Protecting digital identity in the cloudClare Sullivan. 149-170 [doi]
- Provenance for cloud data accountabilityAlan Yu Shyang Tan, Ryan K. L. Ko, Geoff Holmes, Bill Rogers. 171-185 [doi]
- Security as a service (SecaaS) - An overviewBaden Delamore, Ryan K. L. Ko. 187-203 [doi]
- Secure migration to the cloud - In and outThomas Kemmerich, Vivek Agrawal, Carsten Momsen. 205-230 [doi]
- Keeping users empowered in a cloudy Internet of ThingsStefanie Gerdes, Carsten Bormann, Olaf Bergmann. 231-247 [doi]
- Cloud as infrastructure for managing complex scalable business networks, privacy perspectiveAbdussalam Ali, Igor Hawryszkiewycz. 249-267 [doi]
- Psychology and security: Utilizing psychological and communication theories to promote safer cloud security behaviorsGrainne Kirwan. 269-281 [doi]
- Conceptual evidence collection and analysis methodology for Android devicesBen Martini, Quang Do, Kim-Kwang Raymond Choo. 285-307 [doi]
- Mobile cloud forensics: An analysis of seven popular Android appsBen Martini, Quang Do, Kim-Kwang Raymond Choo. 309-345 [doi]
- Recovering residual forensic data from smartphone interactions with cloud storage providersGeorge Grispos, William Bradley Glisson, Tim Storer. 347-382 [doi]
- Integrating digital forensic practices in cloud incident handling: A conceptual Cloud Incident Handling ModelNurul Hidayah Ab Rahman, Kim-Kwang Raymond Choo. 383-400 [doi]
- Cloud security and forensic readiness: The current state of an IaaS providerChaz Vidal, Kim-Kwang Raymond Choo. 401-428 [doi]
- Ubuntu One investigation: Detecting evidences on client machinesMohammad Shariati, Ali Dehghantanha, Ben Martini, Kim-Kwang Raymond Choo. 429-446 [doi]
- Governance in the CloudSai Honig. 449-462 [doi]
- Computational trust methods for security quantification in the cloud ecosystemSheikh Mahbub Habib, Florian Volk, Sascha Hauke, Max Mühlhäuser. 463-493 [doi]
- Tool-based risk assessment of cloud infrastructures as socio-technical systemsMichael Nidd, Marieta Georgieva Ivanova, Christian W. Probst, Axel Tanner. 495-517 [doi]