Table of Contents, vol 11, no 3&4, year 2018

pages: 191 - 200
Applying Soft Systems Methodology to Complex Problem Situations in Critical Infrastructures: The CS-AWARE Case Study
Veronika Kupfersberger, University of Vienna, Austria
Thomas Schaberreiter, University of Vienna, Austria
Chris Wills, CARIS Research Ltd., United Kingdom
Gerald Quirchmayr, University of Vienna, Austria
Juha Röning, University of Oulu, Finland

pages: 201 - 213
A Survey on Microservice Security–Trends in Architecture, Privacy and Standardization on Cloud Computing Environments
Luciano Monteiro, Center of Advanced Studies and Systems of Recife, Brazil
Washington Almeida, Center of Advanced Studies and Systems of Recife, Brazil
Raphael Hazin, Center of Advanced Studies and Systems of Recife, Brazil
Anderson Lima, Center of Advanced Studies and Systems of Recife, Brazil
Sahra Silva, Nassau Mauritius College, Brazil
Felipe Ferraz, Center of Advanced Studies and Systems of Recife, Brazil

pages: 214 - 222
Crime forecasting in small city blocks using a general additive spatio-temporal model
Maria Mahfoud, CWI National Research Institute for Mathematics and Computer Science, The Netherlands
Sandjai Bhulai, Vrije Universiteit Amsterdam, The Netherlands
Rob van der Mei, CWI National Research Institute for Mathematics and Computer Science, The Netherlands

pages: 223 - 231
Achieving GDPR Compliance with Unikernels
Bob Duncan, University of Aberdeen, UK
Andreas Happe, Austrian Institute of Tech., Austria
Alfred Bratterud, Oslo and Akershus University, Norway

pages: 232 - 242
The Complexities of Auditing and Securing Systems in the Cloud — is there a Solution and will the GDPR move it up the Corporate Agenda?
Bob Duncan, University of Aberdeen, UK
Mark Whittington, University of Aberdeen, UK

pages: 243 - 253
Fixing the Cloud Forensic Problem with Blockchain
Yuan Zhao, University of Aberdeen, UK
Bob Duncan, University of Aberdeen, UK

pages: 254 - 263
Will Compliance with the New EU General Data Protection Regulation Lead to Better Cloud Security?
Bob Duncan, University of Aberdeen, UK

pages: 264 - 273
Forensic Recovery and Intrusion Monitoring in the Cloud
George Weir, University of Strathclyde, UK
Andreas Aßmuth, University of Applied Sciences, OTH Amberg-Weiden, Germany
Nicholas Jäger, University of Applied Sciences, OTH Amberg-Weiden, Germany

pages: 274 - 287
GHOST: An evaluated Competence Developing Game for Cybersecurity Awareness Training
Johannes Alexander König, Lab for IT Organization and Management, germany
Martin Wolf, Lab for IT Organization and Management, germany

pages: 288 - 300
Providing Tamper-Resistant Audit Trails with Distributed Ledger based Solutions for Forensics of IoT Systems using Cloud Resources
Magnus Westerlund, Arcada University of Applied Sciences, Finland
Mats Neovius, Åbo Akademi University, Finland
Göran Pulkkis, Arcada University of Applied Sciences, Finland

pages: 301 - 312
Safety, Cybersecurity and Interoperability aspects in Modern Nuclear Power Plants
Asmaa Tellabi, University of Siegen/framatome GmbH, Germany
Ines Ben zid, University of Bielefeld/framatome GmbH, Germany
Edita Bajramovic, Friedrich-Alexander-University Erlangen-Nuremberg/framatome GmbH, Germany
Karl Waedt, framatome GmbH, Germany

pages: 313 - 327
Four Testing Types Core to Informed ICT Governance for Cyber-Resilient Systems
Keith Joiner, School of Engineering and IT, University of New South Wales, Australia
Amit Ghildyal, School of Business, University of New South Wales & Department of Defence, Australia
Narelle Devine, Department of Human Services Australian Government, Australia
Alan Laing, Chief Information Officer Group Department of Defence, Australia
Anne Coull, Information Security Westpac Banking Group, Australia
Elena Sitnikova, Australian Centre for Cybersecurity, University of New South Wales, Australia

download vol 11, no 3&4, year 2018

 
Copyright (c) 2008-2010. IARIA, All rights reserved.