Guest Editorial: Emerging Trends in Research for Insider Threat DetectionA New Certificateless Blind Signature SchemeEnforcing Reputation Constraints on Business Process WorkflowsAnalysing Android’s Full Disk Encryption FeaturePlausibilistic Entropy and AnonymitySupporting Common Criteria Security Analysis with Problem FramesReliability Prediction for Component-based Software Systems with Architectural-level Fault Tolerance Mechanisms (Extended Version)Guest Editorial: Emerging Software Reliability and System Security TechnologiesThe Method of Personalized Recommendation with Ensemble CombinationLattice Based Efficient Threshold Public Key Encryption Scheme