Abstract is missing.
- A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMNNazila Gol Mohammadi, Maritta Heisel. 3-18 [doi]
- Automatic Enforcement of Security PropertiesJosé-Miguel Horcas, Mónica Pinto, Lidia Fuentes. 19-31 [doi]
- Towards a Model-Based Framework for Forensic-Enabled Cloud Information SystemsStavros Simou, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis. 35-47 [doi]
- Modelling Secure Cloud Computing Systems from a Security Requirements PerspectiveShaun Shei, Christos Kalloniatis, Haralambos Mouratidis, Aidan Delaney. 48-62 [doi]
- Bottom-Up Cell Suppression that Preserves the Missing-at-random ConditionYoshitaka Kameya, Kentaro Hayashi. 65-78 [doi]
- Understanding the Privacy Goal IntervenabilityRene Meis, Maritta Heisel. 79-94 [doi]
- Design of a Log Management Infrastructure Using Meta-Network AnalysisVasileios Anastopoulos, Sokratis K. Katsikas. 97-110 [doi]
- The Far Side of Mobile Application Integrated Development EnvironmentsChristos Lyvas, Nikolaos Pitropakis, Costas Lambrinoudakis. 111-122 [doi]