Abstract is missing.
- Challenges of Cloud ForensicsHamid Jahankhani, Amin Hosseinian Far. 1-18 [doi]
- Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements?Bob Duncan, Mark Whittington, Martin Gilje Jaatun, Alfredo Ramiro Reyes Zúñiga. 19-39 [doi]
- The Relationship Between Public Budgeting and Risk Management: Competition or Driving?Yaotai Lu. 40-72 [doi]
- Iris Biometrics Recognition in Security ManagementAhmad Ghaffari, Amin Hosseinian Far, Akbar Sheikh Akbari. 73-96 [doi]
- Automatic Clustering of Malicious IP Flow Records Using Unsupervised LearningMuhammad Fahad Umer, Muhammad Sher. 97-119 [doi]
- A Hybrid Model of Attribute Aggregation in Federated Identity ManagementMd. Sadek Ferdous, Farida Chowdhury, Ron Poet. 120-154 [doi]
- Robust Enterprise Application Security with eTRON ArchitectureM. Fahim Ferdous Khan, Ken Sakamura, Noboru Koshizuka. 155-178 [doi]
- Obfuscation and Diversification for Securing Cloud ComputingShohreh Hosseinzadeh, Samuel Laurén, Sampsa Rauti, Sami Hyrynsalmi, Mauro Conti, Ville Leppänen. 179-202 [doi]
- An Approach to Organizational CybersecurityJose Romero-Mariona, Roger Hallman, Megan Kline, Geancarlo Palavicini, Josiah Bryan, John San Miguel, Lawrence Kerr, Maxine Major, Jorge Alvarez. 203-222 [doi]
- Using Goal-Question-Metric (GQM) Approach to Assess Security in Cloud StorageFara Yahya, Robert J. Walters, Gary B. Wills. 223-240 [doi]
- Security in Organisations: Governance, Risks and Vulnerabilities in Moving to the CloudMadini O. Alassafi, Raid K. Hussain, Ghada Ghashgari, Robert J. Walters, Gary B. Wills. 241-258 [doi]
- Protecting Document Outside Enterprise Network: A Confirmed FrameworkZeyad S. Aaber, Gary B. Wills, Richard M. Crowder. 259-275 [doi]