Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
1. Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS)

Tahir Alyas; Gulzar Ahmad; Yousaf Saeed; Muhammad Asif; Umer Farooq; Asma Kanwal

Volume 11, Issue 3 , Summer and Autumn 2019, , Pages 153-160

http://dx.doi.org/10.22042/isecure.2019.11.0.20

Abstract
  Internet of Things (IoT) and cloud computing technologies have connected the infrastructure of the city to make the context-aware and more intelligent city for utility its major resources. These technologies have much potential to solve thechallenges of urban areas around the globe to facilitate ...  Read More

2. IoT Protocols Based Fog/Cloud over High Traffic

Istabraq M. Al-Joboury; Emad H. Al-Hemiary

Volume 11, Issue 3 , Summer and Autumn 2019, , Pages 173-180

http://dx.doi.org/10.22042/isecure.2019.11.3.23

Abstract
  The Internet of Things (IoT) becomes the future of a global data field in which the embedded devices communicate with each other, exchange data and making decisions through the Internet. IoT could improve the quality of life in smart cities, but a massive amount of data from different smart devices could ...  Read More

3. SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

Javad Ghareh Chamani; Mohammad Sadeq Dousti; Rasool Jalili; Dimitrios Papadopoulos

Volume 11, Issue 1 , Winter and Spring 2019, , Pages 15-34

http://dx.doi.org/10.22042/isecure.2019.148637.430

Abstract
  While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called ...  Read More

4. A risk model for cloud processes

E. Damiani; S. Cimato; G. Gianini

Volume 6, Issue 2 , Summer and Autumn 2014, , Pages 99-123

http://dx.doi.org/10.22042/isecure.2015.6.2.2

Abstract
  Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to ...  Read More