Home // Sec

International Journal On Advances in Security, volume 11, numbers 3 and 4, 2018

Type: journal

Notes: A free access journal featuring works submitted on an invitation basis only.

ISSN: 1942-2636

Articles: there are 12 articles

Applying Soft Systems Methodology to Complex Problem Situations in Critical Infrastructures: The CS-AWARE Case Study
Veronika Kupfersberger, Thomas Schaberreiter, Chris Wills, Gerald Quirchmayr, and Juha Röning
keywords: Critical Infrastructures; System Analysis; Soft Systems Methodology; Socio-technological Analysis; Cyber Situational Awareness; Information Sharing

A Survey on Microservice Security–Trends in Architecture, Privacy and Standardization on Cloud Computing Environments
Luciano Monteiro, Washington Almeida, Raphael Hazin, Anderson Lima, Sahra Silva, and Felipe Ferraz
keywords: Microservice; Security; Cloud; Architecture; API; Monolithic

Crime forecasting in small city blocks using a general additive spatio-temporal model
Maria Mahfoud, Sandjai Bhulai, and Rob van der Mei
keywords: Predictive analytics; forecasting; spatio-temporal modeling; residential burglary.

Achieving GDPR Compliance with Unikernels
Bob Duncan, Andreas Happe, and Alfred Bratterud
keywords: Cloud Forensic Problem; unikernels; EU GDPR, compliance

The Complexities of Auditing and Securing Systems in the Cloud — is there a Solution and will the GDPR move it up the Corporate Agenda?
Bob Duncan and Mark Whittington
keywords: Forensic audit; GDPR compliance; cloud forensic problem

Fixing the Cloud Forensic Problem with Blockchain
Yuan Zhao and Bob Duncan
keywords: Cloud forensic problem; GDPR; blockchain/bitcoin technology

Will Compliance with the New EU General Data Protection Regulation Lead to Better Cloud Security?
Bob Duncan
keywords: EU GDPR; Compliance; Cloud computing; cloud forensic problem

Forensic Recovery and Intrusion Monitoring in the Cloud
George Weir, Andreas Aßmuth, and Nicholas Jäger
keywords: Cloud security; forensic readiness; intrusion monitoring; multi-level interpretation; secure data retention.

GHOST: An evaluated Competence Developing Game for Cybersecurity Awareness Training
Johannes Alexander König and Martin Wolf
keywords: Cybersecurity; Awareness; CDG; Serious Game; tablet game; business simulation

Providing Tamper-Resistant Audit Trails with Distributed Ledger based Solutions for Forensics of IoT Systems using Cloud Resources
Magnus Westerlund, Mats Neovius, and Göran Pulkkis
keywords: IoT; cloud computing; distributed ledger; blockchain; distributed clouds; security; computer forensics

Safety, Cybersecurity and Interoperability aspects in Modern Nuclear Power Plants
Asmaa Tellabi, Ines Ben zid, Edita Bajramovic, and Karl Waedt
keywords: nuclear power plants; cybersecurity interoperability.

Four Testing Types Core to Informed ICT Governance for Cyber-Resilient Systems
Keith Joiner, Amit Ghildyal, Narelle Devine, Alan Laing, Anne Coull, and Elena Sitnikova
keywords: ICT governance; usability testing; cyber-resilience; penetration testing; integration testing; project success factors; stress testing