Table of Contents
Articles
| CTrust: A Framework for Secure and Trustworthy Application Execution in Cloud Computing | |
| Satyajeet Nimgaonkar, Srujan Kotikela, Mahadevan Gomathisankaran | pp. 152-165 |
| A Formal Model of LoA Elevation in Online Trust | |
| Hiroyuki Sato | pp. 166-178 |
| An Interative Association Rule Mining Technique to K-Anonymize a Dataset | |
| Michael Hayes, Miriam A.M. Capretz, Jeff Reed, Cheryl Forchuk | pp. 179-194 |
| Towards Building Proofs of Past Data Possession in Cloud Forensics | |
| Shams Zawoad, Ragib Hasan | pp. 195-207 |