Volume 6, Number 2 (June 2015) BibTex

  • pp. 1-3
  • Guest Editorial: Security in Distributed and Network-Based Computing
  • Igor Kotenko
    [pdf]
  • pp. 4-20
  • Runtime Model Checking for SLA Compliance Monitoring and QoS Prediction
  • Giuseppe Cicotti, Luigi Coppolino, Salvatore D'Antonio, and Luigi Romano
    [Abstract][pdf]
  • pp. 21-40
  • Security Compliance Tracking of Processes in Networked Cooperating Systems
    Roland Rieke, Maria Zhdanova, and J├╝rgen Repp
  • [Abstract][pdf]
  • pp. 41-57
  • Integrated Repository of Security Information for Network Security Evaluation
    Andrey Fedorchenko, Igor Kotenko, and Andrey Chechulin
    [Abstract][pdf]
  • pp. 58-77
  • Selecting Countermeasures for ICT Systems Before They are Attacked
    Fabrizio Baiardi, Federico Tonelli, Alessandro Bertolini, and Roberto Bertolotti
    [Abstract][pdf]
  • pp. 78-97
    Securing mobile devices: malware mitigation methods
    Anastasia Skovoroda and Dennis Gamayunov
    [Abstract][pdf]

       
       [Regular Papers]

  • pp. 98-112
  • A Fine-Grained Privacy Preserving Protocol over Attribute Based Access Control for VANETs
  • Lewis Nkenyereye, Bayu Adhi Tama, Youngho Park, and Kyung Hyune Rhee
    [Abstract][pdf]
  • pp. 113-121
  • Privacy Enhancing Factors in People-Nearby Applications
  • Sehrish Malik and Jong-Hyouk Lee
    [Abstract][pdf]

[Return to Archives]