By Topic

IEEE Transactions on Dependable and Secure Computing

Issue 1 • Jan.-Feb. 2012

Filter Results

Displaying Results 1 - 18 of 18
  • [Front cover]

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • [Cover 2]

    Publication Year: 2012, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • Editorial

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (33 KB) | HTML iconHTML
    Freely Available from IEEE
  • A Flexible Approach to Improving System Reliability with Virtual Lockstep

    Publication Year: 2012, Page(s):2 - 15
    Cited by:  Papers (6)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1711 KB) | HTML iconHTML

    There is an increasing need for fault tolerance capabilities in logic devices brought about by the scaling of transistors to ever smaller geometries. This paper presents a hypervisor-based replication approach that can be applied to commodity hardware to allow for virtually lockstepped execution. It offers many of the benefits of hardware-based lockstep while being cheaper and easier to implement ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Flexible Approach to Multisession Trust Negotiations

    Publication Year: 2012, Page(s):16 - 29
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (398 KB) | HTML iconHTML

    Trust Negotiation has shown to be a successful, policy-driven approach for automated trust establishment, through the release of digital credentials. Current real applications require new flexible approaches to trust negotiations, especially in light of the widespread use of mobile devices. In this paper, we present a multisession dependable approach to trust negotiations. The proposed framework s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Stochastic Model of Multivirus Dynamics

    Publication Year: 2012, Page(s):30 - 45
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1572 KB) | HTML iconHTML

    Understanding the spreading dynamics of computer viruses (worms, attacks) is an important research problem, and has received much attention from the communities of both computer security and statistical physics. However, previous studies have mainly focused on single-virus spreading dynamics. In this paper, we study multivirus spreading dynamics, where multiple viruses attempt to infect computers ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conditional Diagnosability of Augmented Cubes under the PMC Model

    Publication Year: 2012, Page(s):46 - 60
    Cited by:  Papers (43)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1398 KB) | HTML iconHTML

    Processor fault diagnosis has played an important role in measuring the reliability of a multiprocessor system, and the diagnosability of many well-known multiprocessor systems has been widely investigated. The conditional diagnosability is a novel measure of diagnosability by adding an additional condition that any faulty set cannot contain all the neighbors of any node in a system. In this paper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Security Risk Management Using Bayesian Attack Graphs

    Publication Year: 2012, Page(s):61 - 74
    Cited by:  Papers (83)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2118 KB) | HTML iconHTML

    Security risk assessment and mitigation are two vital processes that need to be executed to maintain a productive IT infrastructure. On one hand, models such as attack graphs and attack trees have been proposed to assess the cause-consequence relationships between various network states, while on the other hand, different decision problems have been explored to identify the minimum-cost hardening ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extending Attack Graph-Based Security Metrics and Aggregating Their Application

    Publication Year: 2012, Page(s):75 - 85
    Cited by:  Papers (16)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (571 KB) | HTML iconHTML

    The attack graph is an abstraction that reveals the ways an attacker can leverage vulnerabilities in a network to violate a security policy. When used with attack graph-based security metrics, the attack graph may be used to quantitatively assess security-relevant aspects of a network. The Shortest Path metric, the Number of Paths metric, and the Mean of Path Lengths metric are three attack graph-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low Energy Online Self-Test of Embedded Processors in Dependable WSN Nodes

    Publication Year: 2012, Page(s):86 - 100
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (926 KB) | HTML iconHTML

    Wireless Sensor Network (WSN) nodes are often deployed in harsh environments where the possibility of permanent and especially intermittent faults due to environmental hazards is significantly increased, while silicon aging effects are also exacerbated. Thus, online and in-field testing is necessary to guarantee correctness of operation. At the same time, online testing of processors integrated in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet-Hiding Methods for Preventing Selective Jamming Attacks

    Publication Year: 2012, Page(s):101 - 114
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB) | HTML iconHTML

    The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launchpad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of proto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • pCloud: A Distributed System for Practical PIR

    Publication Year: 2012, Page(s):115 - 127
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1005 KB) | HTML iconHTML

    Computational Private Information Retrieval (cPIR) protocols allow a client to retrieve one bit from a database, without the server inferring any information about the queried bit. These protocols are too costly in practice because they invoke complex arithmetic operations for every bit of the database. In this paper, we present pCloud, a distributed system that constitutes the first attempt towar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Revisiting Defenses against Large-Scale Online Password Guessing Attacks

    Publication Year: 2012, Page(s):128 - 141
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1339 KB) | HTML iconHTML

    Brute force and dictionary attacks on password-only remote login services are now widespread and ever increasing. Enabling convenient login for legitimate users while preventing such attacks is a difficult problem. Automated Turing Tests (ATTs) continue to be an effective, easy-to-deploy approach to identify automated malicious login attempts with reasonable cost of inconvenience to users. In this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2011 Reviewers List

    Publication Year: 2012, Page(s):142 - 143
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • 2011 Annual Index

    Publication Year: 2012, Page(s): not in print
    Request permission for commercial reuse | PDF file iconPDF (161 KB)
    Freely Available from IEEE
  • Advertisement - There now is a quick and easy way to find out about our collection of transactions [new respository for journal updates]

    Publication Year: 2012, Page(s): 144
    Request permission for commercial reuse | PDF file iconPDF (339 KB)
    Freely Available from IEEE
  • TDSC Information for authors

    Publication Year: 2012, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • [Cover 4]

    Publication Year: 2012, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University