


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 9
Volume 9, Number 1, 2012
- Ravi S. Sandhu:
Editorial. 1 - Casey M. Jeffery, Renato J. O. Figueiredo
:
A Flexible Approach to Improving System Reliability with Virtual Lockstep. 2-15 - Anna Cinzia Squicciarini
, Elisa Bertino, Alberto Trombetta
, Stefano Braghin
:
A Flexible Approach to Multisession Trust Negotiations. 16-29 - Shouhuai Xu, Wenlian Lu, Zhenxin Zhan:
A Stochastic Model of Multivirus Dynamics. 30-45 - Nai-Wen Chang, Sun-Yuan Hsieh:
Conditional Diagnosability of Augmented Cubes under the PMC Model. 46-60 - Nayot Poolsappasit, Rinku Dewri, Indrajit Ray:
Dynamic Security Risk Management Using Bayesian Attack Graphs. 61-74 - Nwokedi C. Idika, Bharat K. Bhargava:
Extending Attack Graph-Based Security Metrics and Aggregating Their Application. 75-85 - Andreas Merentitis, Nektarios Kranitis
, Antonis M. Paschalis
, Dimitris Gizopoulos:
Low Energy Online Self-Test of Embedded Processors in Dependable WSN Nodes. 86-100 - Alejandro Proaño, Loukas Lazos:
Packet-Hiding Methods for Preventing Selective Jamming Attacks. 101-114 - Stavros Papadopoulos, Spiridon Bakiras
, Dimitris Papadias:
pCloud: A Distributed System for Practical PIR. 115-127 - Mansour Alsaleh, Mohammad Mannan, Paul C. van Oorschot
:
Revisiting Defenses against Large-Scale Online Password Guessing Attacks. 128-141
Volume 9, Number 2, March - April 2012
- Rodrigo Rodrigues
, Barbara Liskov, Kathryn Chen, Moses D. Liskov, David A. Schultz:
Automatic Reconfiguration for Large-Scale Reliable Storage Systems. 145-158 - Antonio Martínez-Álvarez
, Sergio Cuenca-Asensi
, Felipe Restrepo-Calle
, Francisco R. Palomo
, Hipólito Guzmán-Miranda
, Miguel A. Aguirre
:
Compiler-Directed Soft Error Mitigation for Embedded Systems. 159-172 - Kui Xu, Huijun Xiong, Chehai Wu, Deian Stefan, Danfeng Yao
:
Data-Provenance Verification For Secure Hosts. 173-183 - Guoxing Zhan, Weisong Shi, Hongmei Julia Deng:
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs. 184-197 - Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei Dong, Mary Stephenson, James Michael Barker:
Detecting Spam Zombies by Monitoring Outgoing Messages. 198-210 - Qiming Li, John C. S. Lui, Dah-Ming Chiu:
On the Security and Efficiency of Content Distribution via Network Coding. 211-221 - Sonia Chiasson, Elizabeth Stobert, Alain Forget, Robert Biddle, Paul C. van Oorschot
:
Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism. 222-235 - Fatemeh Borran, Martin Hutle, Nuno Santos, André Schiper:
Quantitative Analysis of Consensus Algorithms. 236-249 - Ziming Zhao, Hongxin Hu, Gail-Joon Ahn
, Ruoyu Wu:
Risk-Aware Mitigation for MANET Routing Attacks. 250-260 - Anupam Das, Mohammad Mahfuzul Islam:
SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems. 261-274 - Shlomi Dolev
, Yinnon A. Haviv:
Stabilization Enabling Technology. 275-288 - Yanjun Zuo:
Survivability Experiment and Attack Characterization for RFID. 289-302 - Xun Yi:
Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting. 303-304
Volume 9, Number 3, May - June 2012
- Matt Bishop, Sophie Engle
, Damien Howard, Sean Whalen:
A Taxonomy of Buffer Overflow Characteristics. 305-317 - Hongxin Hu, Gail-Joon Ahn
, Ketan Kulkarni:
Detecting and Resolving Firewall Policy Anomalies. 318-331 - You Chen, Steve Nyemba, Bradley A. Malin
:
Detecting Anomalous Insiders in Collaborative Information Systems. 332-344 - Ernie Brickell, Jiangtao Li:
Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities. 345-360 - Xiaojun Ruan, Qing Yang, Mohammed I. Alghamdi
, Shu Yin, Xiao Qin:
ES-MPICH2: A Message Passing Interface with Enhanced Security. 361-374 - Erman Ayday, Faramarz Fekri
:
Iterative Trust and Reputation Management Using Belief Propagation. 375-386 - Daniele Riboni
, Linda Pareschi, Claudio Bettini
:
JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks. 387-400 - Zhang Fu, Marina Papatriantafilou
, Philippas Tsigas
:
Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts. 401-413 - Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici:
M-Score: A Misuseability Weight Measure. 414-428 - Wenjuan Xu, Xinwen Zhang, Hongxin Hu, Gail-Joon Ahn
, Jean-Pierre Seifert:
Remote Attestation with Domain-Based Integrity Model and Policy Analysis. 429-442 - Huaqun Wang, Yuqing Zhang:
On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks. 443-446
Volume 9, Number 4, July - August 2012
- Christos Dimitrakakis
, Tom Karygiannis, Aikaterini Mitrokotsa
:
Guest Editors' Introduction: Special Section on Learning, Games, and Security. 449-450 - Robert Nix, Murat Kantarcioglu:
Incentive Compatible Privacy-Preserving Distributed Classification. 451-462 - Manas A. Pathak, Bhiksha Raj:
Large Margin Gaussian Mixture Models with Differential Privacy. 463-469 - Ye Zhu, Yuanchao Lu, Anil Vikram:
On Privacy of Encrypted Speech Communications. 470-481 - Adam Barth, Benjamin I. P. Rubinstein
, Mukund Sundararajan, John C. Mitchell, Dawn Song, Peter L. Bartlett
:
A Learning-Based Approach to Reactive Security. 482-493 - Jun-Won Ho, Matthew K. Wright
, Sajal K. Das
:
ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing. 494-511 - Meixing Le, Angelos Stavrou
, Brent ByungHoon Kang:
DoubleGuard: Detecting Intrusions in Multitier Web Applications. 512-525 - Dianxiang Xu, Manghui Tu, Michael Sanford, Lijo Thomas, Daniel Woodraska, Weifeng Xu:
Automated Security Test Generation with Formal Threat Models. 526-540 - Zhiyong Shan, Xin Wang, Tzi-cker Chiueh:
Enforcing Mandatory Access Control in Commodity OS to Disable Malware. 541-555 - Smitha Sundareswaran, Anna Cinzia Squicciarini
, Dan Lin:
Ensuring Distributed Accountability for Data Sharing in the Cloud. 556-568 - Alessandro Mei, Julinda Stefa
:
Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals. 569-582 - Mohamed Shehab
, Said Marouf:
Recommendation Models for Open Authorization. 583-596 - Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino:
Resilient Authenticated Execution of Critical Applications in Untrusted Environments. 597-609 - Roberto Cortiñas
, Felix C. Freiling, Marjan Ghajar-Azadanlou, Alberto Lafuente, Mikel Larrea
, Lucia Draque Penso, Iratxe Soraluze Arriola
:
Secure Failure Detection and Consensus in TrustedPals. 610-625
Volume 9, Number 5, September - October 2012
- Elena Ferrari
, Bhavani Thuraisingham:
Guest Editors' Introduction: Special Section on Data and Applications Security and Privacy. 625-626 - Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino:
Privacy-Preserving Enforcement of Spatially Aware RBAC. 627-640 - David Rebollo-Monedero
, Jordi Forné
, Josep Domingo-Ferrer
:
Query Profile Obfuscation by Means of Optimal Query Exchange between Users. 641-654 - Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri
, Yuan Hong:
Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition. 655-669 - Steve Barker, Valerio Genovese:
Access Control with Privacy Enhancements a Unified Approach. 670-683 - Ali Inan
, Murat Kantarcioglu, Gabriel Ghinita, Elisa Bertino:
A Hybrid Approach to Private Record Matching. 684-698 - Santosh Chandrasekhar, Saikat Chakrabarti, Mukesh Singhal:
A Trapdoor Hash-Based Mechanism for Stream Authentication. 699-713 - Roberto Perdisci
, Igino Corona
, Giorgio Giacinto
:
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis. 714-726 - Javier Herranz
, Jordi Nin
, Marc Solé:
More Hybrid and Secure Protection of Statistical Data Sets. 727-740 - Jing Dong, Reza Curtmola, Cristina Nita-Rotaru, David K. Y. Yau:
Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems. 741-755 - Hoon Wei Lim, Florian Kerschbaum, Huaxiong Wang:
Workflow Signatures for Business Process Compliance. 756-769 - Xiaodao Chen, Chen Liao, Tongquan Wei, Shiyan Hu:
An Interconnect Reliability-Driven Routing Technique for Electromigration Failure Avoidance. 770-776
Volume 9, Number 6, November - December 2012
- Yan Sun, Hong Luo, Sajal K. Das
:
A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks. 785-797 - Danai Chasaki, Tilman Wolf
:
Attacks and Defenses in the Data Plane of Networks. 798-810 - Zi Chu, Steven Gianvecchio, Haining Wang, Sushil Jajodia
:
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? 811-824 - Hannes Holm, Mathias Ekstedt, Dennis Andersson:
Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks. 825-837 - Weiqi Dai, T. Paul Parker, Hai Jin, Shouhuai Xu:
Enhancing Data Trustworthiness via Assured Digital Signing. 838-851 - Hossen Asiful Mustafa
, Xin Zhang, Zhenhua Liu, Wenyuan Xu, Adrian Perrig:
Jamming-Resilient Multipath Routing. 852-864 - Zhenyu Wu, Mengjun Xie
, Haining Wang:
On Energy Security of Server Systems. 865-876 - Amirreza Masoumzadeh, James Joshi:
Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks. 877-889 - Xiapu Luo
, Edmond W. W. Chan, Peng Zhou, Rocky K. C. Chang
:
Robust Network Covert Communications Based on TCP and Enumerative Combinatorics. 890-902 - Yang Tang, Patrick P. C. Lee
, John C. S. Lui, Radia J. Perlman:
Secure Overlay Cloud Storage with Access Control and Assured Deletion. 903-916 - Jordi Cucurull, Mikael Asplund
, Simin Nadjm-Tehrani, Tiziano Santoro:
Surviving Attacks in Challenged Networks. 917-929 - Jennifer T. Jackson, Sadie Creese:
Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviors. 930-943

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.