Go home now Header Background Image
Submission Procedure
share: |
Follow us
Volume 18

Content of Issue 12
DOI: 10.3217/jucs-018-12
An Overview of Current Information Systems Security Challenges and Innovations D. Mellado, D.G. Rosado 1598
Aligning Security and Privacy to Support the Development of Secure Information Systems H. Mouratidis, C. Kalloniatis, S. Islam, M.-P. Huget, S. Gritzalis 1608
Information Security Service Culture - Information Security for End-users R. Rastogi, R. von Solms 1628
A Novel Identity-based Network Architecture for Next Generation Internet P. Martinez-Julia, A.F. Gómez-Skarmeta 1643
Analysing the Security Risks of Cloud Adoption Using the SeCA Model: A Case Study T. Baars, M. Spruit 1662
Risk-Driven Security Metrics in Agile Software Development - An Industrial Pilot Study R.M. Savola, C. Frühwirth, A. Pietikäinen 1679
HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management I. Caballero, L.E. Sánchez, A. Freitas, E. Fernández-Medina 1703
The Modelling of a Digital Forensic Readiness Approach for Wireless Local Area Networks S. Ngobeni, H. Venter, I. Burke 1721
New Results of Related-key Attacks on All Py-Family of Stream Ciphers L. Ding, J. Guan, W.-l. Sun 1741