Table of contents
Sealed computation: a mechanism to support privacy-aware trustworthy cloud service
Lamya Abdullah, Juan QuinteroThe purpose of this study is to propose an approach to avoid having to trust a single entity in cloud-based applications. In cloud computing, data processing is delegated to a…
Keep on rating – on the systematic rating and comparison of authentication schemes
Verena Zimmermann, Nina Gerber, Peter Mayer, Marius Kleboth, Alexandra von Preuschen, Konstantin SchmidtSix years ago, Bonneau et al. (2012) proposed a framework to compare authentication schemes to the ubiquitous text password. Even though their work did not reveal an alternative…
A normative decision-making model for cyber security
Andrew M’manga, Shamal Faily, John McAlaney, Chris Williams, Youki Kadobayashi, Daisuke MiyamotoThe purpose of this paper is to investigate security decision-making during risk and uncertain conditions and to propose a normative model capable of tracing the decision…
Making secret sharing based cloud storage usable
Erik Framner, Simone Fischer-Hübner, Thomas Lorünser, Ala Sarah Alaqra, John Sören PetterssonThe purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent…
Developing and validating a common body of knowledge for information privacy
Rena Lavranou, Aggeliki TsohouThis paper aims to present a common body of knowledge (CBK) for the field of information privacy, titled InfoPrivacy CBK. The purpose of the proposed CBK is to guide internet…
A scheme for the sticky policy representation supporting secure cyber-threat intelligence analysis and sharing
Oleksii Osliak, Andrea Saracino, Fabio MartinelliThis paper aims to propose a structured threat information expression (STIX)-based data representation for privacy-preserving data analysis to report format and semantics of…
Practical evaluation of a reference architecture for the management of privacy level agreements
Vasiliki Diamantopoulou, Haralambos MouratidisThe enforcement of the General Data Protection Regulation imposes specific privacy- and -security related requirements that any organisation that processes European Union…
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell