Guest Editorial: Frontiers in Insider Threats and Data Leakage PreventionA virtualized usage control bus systemHiding Information into OOXML Documents: New Steganographic PerspectivesAdvanced File Carving Approaches for Multimedia FilesDoubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and Receiver-AnonymitySPRINT- Responsibilities: Design and Development of Security Policies in Process-aware Information SystemsGuest Editorial: Advances in Applied SecurityConstructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each OtherMobile Banking Payment SystemA Proxy E-Raffle Protocol Based on Proxy Signatures