Guest Editorial: Security in Distributed and Network-Based Computing
Runtime Model Checking for SLA Compliance Monitoring and QoS Prediction
Security Compliance Tracking of Processes in Networked Cooperating Systems
Integrated Repository of Security Information for Network Security Evaluation
Selecting Countermeasures for ICT Systems Before They are Attacked
Securing mobile devices: malware mitigation methods
A Fine-Grained Privacy Preserving Protocol over Attribute Based Access Control for VANETs
Privacy Enhancing Factors in People-Nearby Applications