Towards Interoperabilty in Identity Federation SystemsAn Innovative Approach for the Management of Cross-Coupling Interference in Street Lighting NetworksA Simply Energy-efficient Migration Algorithm of Processes with Virtual Machines in Server ClustersA formal approach for network security policy validationInsider Threats and Auctions: Formalization, Mechanized Proof, and Code GenerationFormalising policies for insider-threat detection: A tripwire grammarLinear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control SystemsGuest Editorial: Insider Threat Solutions – Moving from Concept to RealityEnhancing Process Control in Industry 4.0 Scenarios using Cyber-Physical SystemsEnhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions