Content of Issue 12
DOI: 10.3217/jucs-018-12
|
| An Overview of Current Information Systems Security Challenges and Innovations |
D. Mellado, D.G. Rosado |
1598 |
| Aligning Security and Privacy to Support the Development of Secure Information Systems |
H. Mouratidis, C. Kalloniatis, S. Islam, M.-P. Huget, S. Gritzalis |
1608 |
| Information Security Service Culture - Information Security for End-users |
R. Rastogi, R. von Solms |
1628 |
| A Novel Identity-based Network Architecture for Next Generation Internet |
P. Martinez-Julia, A.F. Gómez-Skarmeta |
1643 |
| Analysing the Security Risks of Cloud Adoption Using the SeCA Model: A Case Study |
T. Baars, M. Spruit |
1662 |
| Risk-Driven Security Metrics in Agile Software Development - An Industrial Pilot Study |
R.M. Savola, C. Frühwirth, A. Pietikäinen |
1679 |
| HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management |
I. Caballero, L.E. Sánchez, A. Freitas, E. Fernández-Medina |
1703 |
| The Modelling of a Digital Forensic Readiness Approach for Wireless Local Area Networks |
S. Ngobeni, H. Venter, I. Burke |
1721 |
| New Results of Related-key Attacks on All Py-Family of Stream Ciphers |
L. Ding, J. Guan, W.-l. Sun |
1741 |