


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 9
Volume 9, Number 1, 2012
- Ravi S. Sandhu:

Editorial. 1 - Casey M. Jeffery, Renato J. O. Figueiredo

:
A Flexible Approach to Improving System Reliability with Virtual Lockstep. 2-15 - Anna Cinzia Squicciarini

, Elisa Bertino, Alberto Trombetta
, Stefano Braghin
:
A Flexible Approach to Multisession Trust Negotiations. 16-29 - Shouhuai Xu, Wenlian Lu, Zhenxin Zhan:

A Stochastic Model of Multivirus Dynamics. 30-45 - Nai-Wen Chang

, Sun-Yuan Hsieh:
Conditional Diagnosability of Augmented Cubes under the PMC Model. 46-60 - Nayot Poolsappasit, Rinku Dewri, Indrajit Ray:

Dynamic Security Risk Management Using Bayesian Attack Graphs. 61-74 - Nwokedi C. Idika, Bharat K. Bhargava:

Extending Attack Graph-Based Security Metrics and Aggregating Their Application. 75-85 - Andreas Merentitis, Nektarios Kranitis

, Antonis M. Paschalis
, Dimitris Gizopoulos:
Low Energy Online Self-Test of Embedded Processors in Dependable WSN Nodes. 86-100 - Alejandro Proaño, Loukas Lazos:

Packet-Hiding Methods for Preventing Selective Jamming Attacks. 101-114 - Stavros Papadopoulos, Spiridon Bakiras

, Dimitris Papadias:
pCloud: A Distributed System for Practical PIR. 115-127 - Mansour Alsaleh, Mohammad Mannan, Paul C. van Oorschot

:
Revisiting Defenses against Large-Scale Online Password Guessing Attacks. 128-141
Volume 9, Number 2, March - April 2012
- Rodrigo Rodrigues

, Barbara Liskov, Kathryn Chen, Moses D. Liskov, David A. Schultz:
Automatic Reconfiguration for Large-Scale Reliable Storage Systems. 145-158 - Antonio Martínez-Álvarez

, Sergio Cuenca-Asensi
, Felipe Restrepo-Calle
, Francisco R. Palomo
, Hipólito Guzmán-Miranda
, Miguel A. Aguirre
:
Compiler-Directed Soft Error Mitigation for Embedded Systems. 159-172 - Kui Xu, Huijun Xiong, Chehai Wu, Deian Stefan, Danfeng Yao

:
Data-Provenance Verification For Secure Hosts. 173-183 - Guoxing Zhan, Weisong Shi, Hongmei Julia Deng:

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs. 184-197 - Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei Dong, Mary Stephenson, James Michael Barker:

Detecting Spam Zombies by Monitoring Outgoing Messages. 198-210 - Qiming Li, John C. S. Lui, Dah-Ming Chiu:

On the Security and Efficiency of Content Distribution via Network Coding. 211-221 - Sonia Chiasson, Elizabeth Stobert, Alain Forget, Robert Biddle, Paul C. van Oorschot

:
Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism. 222-235 - Fatemeh Borran, Martin Hutle, Nuno Santos, André Schiper:

Quantitative Analysis of Consensus Algorithms. 236-249 - Ziming Zhao, Hongxin Hu, Gail-Joon Ahn

, Ruoyu Wu:
Risk-Aware Mitigation for MANET Routing Attacks. 250-260 - Anupam Das, Mohammad Mahfuzul Islam:

SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems. 261-274 - Shlomi Dolev

, Yinnon A. Haviv:
Stabilization Enabling Technology. 275-288 - Yanjun Zuo:

Survivability Experiment and Attack Characterization for RFID. 289-302 - Xun Yi:

Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting. 303-304
Volume 9, Number 3, May - June 2012
- Matt Bishop

, Sophie Engle
, Damien Howard, Sean Whalen:
A Taxonomy of Buffer Overflow Characteristics. 305-317 - Hongxin Hu, Gail-Joon Ahn

, Ketan Kulkarni:
Detecting and Resolving Firewall Policy Anomalies. 318-331 - You Chen, Steve Nyemba, Bradley A. Malin

:
Detecting Anomalous Insiders in Collaborative Information Systems. 332-344 - Ernie Brickell, Jiangtao Li:

Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities. 345-360 - Xiaojun Ruan, Qing Yang, Mohammed I. Alghamdi

, Shu Yin, Xiao Qin
:
ES-MPICH2: A Message Passing Interface with Enhanced Security. 361-374 - Erman Ayday, Faramarz Fekri

:
Iterative Trust and Reputation Management Using Belief Propagation. 375-386 - Daniele Riboni

, Linda Pareschi, Claudio Bettini
:
JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks. 387-400 - Zhang Fu, Marina Papatriantafilou

, Philippas Tsigas
:
Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts. 401-413 - Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici:

M-Score: A Misuseability Weight Measure. 414-428 - Wenjuan Xu, Xinwen Zhang, Hongxin Hu, Gail-Joon Ahn

, Jean-Pierre Seifert:
Remote Attestation with Domain-Based Integrity Model and Policy Analysis. 429-442 - Huaqun Wang, Yuqing Zhang:

On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks. 443-446
Volume 9, Number 4, July - August 2012
- Christos Dimitrakakis

, Tom Karygiannis, Aikaterini Mitrokotsa
:
Guest Editors' Introduction: Special Section on Learning, Games, and Security. 449-450 - Robert Nix, Murat Kantarcioglu:

Incentive Compatible Privacy-Preserving Distributed Classification. 451-462 - Manas A. Pathak, Bhiksha Raj:

Large Margin Gaussian Mixture Models with Differential Privacy. 463-469 - Ye Zhu, Yuanchao Lu, Anil Vikram:

On Privacy of Encrypted Speech Communications. 470-481 - Adam Barth, Benjamin I. P. Rubinstein

, Mukund Sundararajan, John C. Mitchell, Dawn Song, Peter L. Bartlett
:
A Learning-Based Approach to Reactive Security. 482-493 - Jun-Won Ho, Matthew K. Wright

, Sajal K. Das
:
ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing. 494-511 - Meixing Le, Angelos Stavrou

, Brent ByungHoon Kang:
DoubleGuard: Detecting Intrusions in Multitier Web Applications. 512-525 - Dianxiang Xu, Manghui Tu, Michael Sanford, Lijo Thomas, Daniel Woodraska, Weifeng Xu:

Automated Security Test Generation with Formal Threat Models. 526-540 - Zhiyong Shan, Xin Wang, Tzi-cker Chiueh:

Enforcing Mandatory Access Control in Commodity OS to Disable Malware. 541-555 - Smitha Sundareswaran, Anna Cinzia Squicciarini

, Dan Lin:
Ensuring Distributed Accountability for Data Sharing in the Cloud. 556-568 - Alessandro Mei

, Julinda Stefa
:
Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals. 569-582 - Mohamed Shehab

, Said Marouf:
Recommendation Models for Open Authorization. 583-596 - Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino:

Resilient Authenticated Execution of Critical Applications in Untrusted Environments. 597-609 - Roberto Cortiñas

, Felix C. Freiling, Marjan Ghajar-Azadanlou, Alberto Lafuente, Mikel Larrea
, Lucia Draque Penso, Iratxe Soraluze Arriola
:
Secure Failure Detection and Consensus in TrustedPals. 610-625
Volume 9, Number 5, September - October 2012
- Elena Ferrari

, Bhavani Thuraisingham:
Guest Editors' Introduction: Special Section on Data and Applications Security and Privacy. 625-626 - Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino:

Privacy-Preserving Enforcement of Spatially Aware RBAC. 627-640 - David Rebollo-Monedero

, Jordi Forné
, Josep Domingo-Ferrer
:
Query Profile Obfuscation by Means of Optimal Query Exchange between Users. 641-654 - Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri

, Yuan Hong
:
Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition. 655-669 - Steve Barker, Valerio Genovese:

Access Control with Privacy Enhancements a Unified Approach. 670-683 - Ali Inan

, Murat Kantarcioglu, Gabriel Ghinita, Elisa Bertino:
A Hybrid Approach to Private Record Matching. 684-698 - Santosh Chandrasekhar, Saikat Chakrabarti, Mukesh Singhal:

A Trapdoor Hash-Based Mechanism for Stream Authentication. 699-713 - Roberto Perdisci

, Igino Corona
, Giorgio Giacinto
:
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis. 714-726 - Javier Herranz

, Jordi Nin
, Marc Solé:
More Hybrid and Secure Protection of Statistical Data Sets. 727-740 - Jing Dong, Reza Curtmola, Cristina Nita-Rotaru, David K. Y. Yau:

Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems. 741-755 - Hoon Wei Lim, Florian Kerschbaum, Huaxiong Wang:

Workflow Signatures for Business Process Compliance. 756-769 - Xiaodao Chen, Chen Liao, Tongquan Wei, Shiyan Hu

:
An Interconnect Reliability-Driven Routing Technique for Electromigration Failure Avoidance. 770-776
Volume 9, Number 6, November - December 2012
- Yan Sun, Hong Luo, Sajal K. Das

:
A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks. 785-797 - Danai Chasaki, Tilman Wolf

:
Attacks and Defenses in the Data Plane of Networks. 798-810 - Zi Chu, Steven Gianvecchio, Haining Wang, Sushil Jajodia

:
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? 811-824 - Hannes Holm

, Mathias Ekstedt, Dennis Andersson:
Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks. 825-837 - Weiqi Dai, T. Paul Parker, Hai Jin, Shouhuai Xu:

Enhancing Data Trustworthiness via Assured Digital Signing. 838-851 - Hossen Asiful Mustafa

, Xin Zhang, Zhenhua Liu, Wenyuan Xu, Adrian Perrig:
Jamming-Resilient Multipath Routing. 852-864 - Zhenyu Wu, Mengjun Xie

, Haining Wang:
On Energy Security of Server Systems. 865-876 - Amirreza Masoumzadeh, James Joshi:

Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks. 877-889 - Xiapu Luo

, Edmond W. W. Chan, Peng Zhou, Rocky K. C. Chang
:
Robust Network Covert Communications Based on TCP and Enumerative Combinatorics. 890-902 - Yang Tang, Patrick P. C. Lee

, John C. S. Lui, Radia J. Perlman:
Secure Overlay Cloud Storage with Access Control and Assured Deletion. 903-916 - Jordi Cucurull, Mikael Asplund

, Simin Nadjm-Tehrani, Tiziano Santoro:
Surviving Attacks in Challenged Networks. 917-929 - Jennifer T. Jackson, Sadie Creese:

Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviors. 930-943

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














