Content of Issue 12
DOI: 10.3217/jucs-018-12
|
An Overview of Current Information Systems Security Challenges and Innovations |
D. Mellado, D.G. Rosado |
1598 |
Aligning Security and Privacy to Support the Development of Secure Information Systems |
H. Mouratidis, C. Kalloniatis, S. Islam, M.-P. Huget, S. Gritzalis |
1608 |
Information Security Service Culture - Information Security for End-users |
R. Rastogi, R. von Solms |
1628 |
A Novel Identity-based Network Architecture for Next Generation Internet |
P. Martinez-Julia, A.F. Gómez-Skarmeta |
1643 |
Analysing the Security Risks of Cloud Adoption Using the SeCA Model: A Case Study |
T. Baars, M. Spruit |
1662 |
Risk-Driven Security Metrics in Agile Software Development - An Industrial Pilot Study |
R.M. Savola, C. Frühwirth, A. Pietikäinen |
1679 |
HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management |
I. Caballero, L.E. Sánchez, A. Freitas, E. Fernández-Medina |
1703 |
The Modelling of a Digital Forensic Readiness Approach for Wireless Local Area Networks |
S. Ngobeni, H. Venter, I. Burke |
1721 |
New Results of Related-key Attacks on All Py-Family of Stream Ciphers |
L. Ding, J. Guan, W.-l. Sun |
1741 |