By Topic

Dependable and Secure Computing, IEEE Transactions on

Issue 3 • Date May-June 2012

Filter Results

Displaying Results 1 - 17 of 17
  • [Front cover]

    Publication Year: 2012 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (110 KB)  
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2012 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (122 KB)  
    Freely Available from IEEE
  • A Taxonomy of Buffer Overflow Characteristics

    Publication Year: 2012 , Page(s): 305 - 317
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (352 KB) |  | HTML iconHTML  

    Significant work on vulnerabilities focuses on buffer overflows, in which data exceeding the bounds of an array is loaded into the array. The loading continues past the array boundary, causing variables and state information located adjacent to the array to change. As the process is not programmed to check for these additional changes, the process acts incorrectly. The incorrect action often place... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting and Resolving Firewall Policy Anomalies

    Publication Year: 2012 , Page(s): 318 - 331
    Cited by:  Papers (16)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1584 KB) |  | HTML iconHTML  

    The advent of emerging computing technologies such as service-oriented architecture and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services. Firewalls are the most widely deployed security mechanism to ensure the security of private networks in most busi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Anomalous Insiders in Collaborative Information Systems

    Publication Year: 2012 , Page(s): 332 - 344
    Cited by:  Papers (3)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1746 KB) |  | HTML iconHTML  

    Collaborative information systems (CISs) are deployed within a diverse array of environments that manage sensitive information. Current security mechanisms detect insider threats, but they are ill-suited to monitor systems in which users function in dynamic teams. In this paper, we introduce the community anomaly detection system (CADS), an unsupervised learning framework to detect insider threats... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities

    Publication Year: 2012 , Page(s): 345 - 360
    Cited by:  Papers (8)
    Multimedia
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (240 KB) |  | HTML iconHTML  

    Direct Anonymous Attestation (DAA) is a scheme that enables the remote authentication of a Trusted Platform Module (TPM) while preserving the user's privacy. A TPM can prove to a remote party that it is a valid TPM without revealing its identity and without linkability. In the DAA scheme, a TPM can be revoked only if the DAA private key in the hardware has been extracted and published widely so th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ES-MPICH2: A Message Passing Interface with Enhanced Security

    Publication Year: 2012 , Page(s): 361 - 374
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2084 KB) |  | HTML iconHTML  

    An increasing number of commodity clusters are connected to each other by public networks, which have become a potential threat to security sensitive parallel applications running on the clusters. To address this security issue, we developed a Message Passing Interface (MPI) implementation to preserve confidentiality of messages communicated among nodes of clusters in an unsecured network. We focu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iterative Trust and Reputation Management Using Belief Propagation

    Publication Year: 2012 , Page(s): 375 - 386
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1281 KB) |  | HTML iconHTML  

    In this paper, we introduce the first application of the belief propagation algorithm in the design and evaluation of trust and reputation management systems. We approach the reputation management problem as an inference problem and describe it as computing marginal likelihood distributions from complicated global functions of many variables. However, we observe that computing the marginal probabi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks

    Publication Year: 2012 , Page(s): 387 - 400
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2094 KB) |  | HTML iconHTML  

    Web queries, credit card transactions, and medical records are examples of transaction data flowing in corporate data stores, and often revealing associations between individuals and sensitive information. The serial release of these data to partner institutions or data analysis centers in a nonaggregated form is a common situation. In this paper, we show that correlations among sensitive values a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts

    Publication Year: 2012 , Page(s): 401 - 413
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (564 KB) |  | HTML iconHTML  

    Network-based applications commonly open some known communication port(s), making themselves easy targets for (distributed) Denial of Service (DoS) attacks. Earlier solutions for this problem are based on port-hopping between pairs of processes which are synchronous or exchange acknowledgments. However, acknowledgments, if lost, can cause a port to be open for longer time and thus be vulnerable, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • M-Score: A Misuseability Weight Measure

    Publication Year: 2012 , Page(s): 414 - 428
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2393 KB) |  | HTML iconHTML  

    Detecting and preventing data leakage and data misuse poses a serious challenge for organizations, especially when dealing with insiders with legitimate permissions to access the organization's systems and its critical data. In this paper, we present a new concept, Misuseability Weight, for estimating the risk emanating from data exposed to insiders. This concept focuses on assigning a score that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote Attestation with Domain-Based Integrity Model and Policy Analysis

    Publication Year: 2012 , Page(s): 429 - 442
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1488 KB) |  | HTML iconHTML  

    We propose and implement an innovative remote attestation framework called DR@FT for efficiently measuring a target system based on an information flow-based integrity model. With this model, the high integrity processes of a system are first measured and verified, and these processes are then protected from accesses initiated by low integrity processes. Toward dynamic systems with frequently chan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks

    Publication Year: 2012 , Page(s): 443 - 446
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (95 KB) |  | HTML iconHTML  

    In 2011, Sun et al. [CHECK END OF SENTENCE] proposed a security architecture to ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in wireless mesh networks (WMNs). It strives to resolve the conflicts between the anonymity and traceability objectives. In this paper, we attacked Sun et al. scheme's traceability. Our analysis showed that tru... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stay Connected with the IEEE Computer Society [advertisement]

    Publication Year: 2012 , Page(s): 447
    Save to Project icon | Request Permissions | PDF file iconPDF (339 KB)  
    Freely Available from IEEE
  • Take the CS Library wherever you go! [advertisement]

    Publication Year: 2012 , Page(s): 448
    Save to Project icon | Request Permissions | PDF file iconPDF (295 KB)  
    Freely Available from IEEE
  • [Inside back cover]

    Publication Year: 2012 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (122 KB)  
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2012 , Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (110 KB)  
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University