By Topic

IEEE Transactions on Dependable and Secure Computing

Issue 5 • Sept.-Oct. 2012

Filter Results

Displaying Results 1 - 24 of 24
  • [Front cover]

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2012, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Special Section on Data and Applications Security and Privacy 
  • Guest Editors' Introduction: Special Section on Data and Applications Security and Privacy

    Publication Year: 2012, Page(s):625 - 626
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (77 KB) | HTML iconHTML
    Freely Available from IEEE
  • Privacy-Preserving Enforcement of Spatially Aware RBAC

    Publication Year: 2012, Page(s):627 - 640
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1119 KB) | HTML iconHTML

    Several models for incorporating spatial constraints into role-based access control (RBAC) have been proposed, and researchers are now focusing on the challenge of ensuring such policies are enforced correctly. However, existing approaches have a major shortcoming, as they assume the server is trustworthy and require complete disclosure of sensitive location information by the user. In this work, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Query Profile Obfuscation by Means of Optimal Query Exchange between Users

    Publication Year: 2012, Page(s):641 - 654
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1612 KB) | HTML iconHTML

    We address the problem of query profile obfuscation by means of partial query exchanges between two users, in order for their profiles of interest to appear distorted to the information provider (database, search engine, etc.). We illustrate a methodology to reach mutual privacy gain, that is, a situation where both users increase their own privacy protection through collaboration in query exchang... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition

    Publication Year: 2012, Page(s):655 - 669
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4068 KB) | HTML iconHTML

    The role mining problem has received considerable attention recently. Among the many solutions proposed, the Boolean matrix decomposition (BMD) formulation has stood out, which essentially discovers roles by decomposing the binary matrix representing user-to-permission assignment (UPA) into two matrices-user-to-role assignment (UA) and permission-to-role assignment (PA). However, supporting certai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access Control with Privacy Enhancements a Unified Approach

    Publication Year: 2012, Page(s):670 - 683
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (458 KB) | HTML iconHTML

    We describe an approach that aims to unify certain aspects of access control and privacy. Our unified approach is based on the idea of axiomatizing access control in general terms. We show how multiple access control and privacy models and policies can be uniformly represented as particular logical theories in our axiom system. We show that our approach translates into different practical language... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Approach to Private Record Matching

    Publication Year: 2012, Page(s):684 - 698
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (873 KB) | HTML iconHTML

    Real-world entities are not always represented by the same set of features in different data sets. Therefore, matching records of the same real-world entity distributed across these data sets is a challenging task. If the data sets contain private information, the problem becomes even more difficult. Existing solutions to this problem generally follow two approaches: sanitization techniques and cr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Trapdoor Hash-Based Mechanism for Stream Authentication

    Publication Year: 2012, Page(s):699 - 713
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB) | HTML iconHTML

    Digital streaming Internet applications such as online gaming, multimedia playback, presentations, news feeds, and stock quotes involve end-users with very low tolerance for high latency, low data rates, and playback interruption. To protect such delay-sensitive streams against malicious attacks, security mechanisms need to be designed to efficiently process long sequence of bits. We study the pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis

    Publication Year: 2012, Page(s):714 - 726
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (905 KB) | HTML iconHTML

    In this paper, we present FluxBuster, a novel passive DNS traffic analysis system for detecting and tracking malicious flux networks. FluxBuster applies large-scale monitoring of DNS traffic traces generated by recursive DNS (RDNS) servers located in hundreds of different networks scattered across several different geographical locations. Unlike most previous work, our detection approach is not li... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • More Hybrid and Secure Protection of Statistical Data Sets

    Publication Year: 2012, Page(s):727 - 740
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1170 KB) | HTML iconHTML

    Different methods and paradigms to protect data sets containing sensitive statistical information have been proposed and studied. The idea is to publish a perturbed version of the data set that does not leak confidential information, but that still allows users to obtain meaningful statistical values about the original data. The two main paradigms for data set protection are the classical one and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems

    Publication Year: 2012, Page(s):741 - 755
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1023 KB) | HTML iconHTML Multimedia Media

    We study data pollution attacks in wireless interflow network coding systems. Although several defenses for these attacks are known for intraflow network coding systems, none of them are applicable to interflow coding systems. We formulate a model for interflow network coding that encompasses all the existing systems, and use it to analyze the impact of pollution attacks. Our analysis shows that t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workflow Signatures for Business Process Compliance

    Publication Year: 2012, Page(s):756 - 769
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB) | HTML iconHTML

    Interorganizational workflow systems play a fundamental role in business partnerships. We introduce and investigate the concept of workflow signatures. Not only can these signatures be used to ensure authenticity and protect integrity of workflow data, but also to prove the sequence and logical relationships, such as AND-join and AND-split, of a workflow. Hence, workflow signatures can be electron... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Interconnect Reliability-Driven Routing Technique for Electromigration Failure Avoidance

    Publication Year: 2012, Page(s):770 - 776
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (519 KB)

    As VLSI technology enters the nanoscale regime, design reliability is becoming increasingly important. A major design reliability concern arises from electromigration which refers to the transport of material caused by ion movement in interconnects. Since the lifetime of an interconnect drastically depends on the current flowing through it, the electromigration problem aggravates with increasingly... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for Papers: Special Issue on Cloud Computing Assessment

    Publication Year: 2012, Page(s): 777
    Request permission for commercial reuse | PDF file iconPDF (1170 KB)
    Freely Available from IEEE
  • Call for Papers: Transactions on Dependable and Secure Computing

    Publication Year: 2012, Page(s): 778
    Request permission for commercial reuse | PDF file iconPDF (1127 KB)
    Freely Available from IEEE
  • What's new in Transactions [advertisement]

    Publication Year: 2012, Page(s): 779
    Request permission for commercial reuse | PDF file iconPDF (777 KB)
    Freely Available from IEEE
  • New Transactions Newsletter [advertisement]

    Publication Year: 2012, Page(s): 780
    Request permission for commercial reuse | PDF file iconPDF (661 KB)
    Freely Available from IEEE
  • Transactions Media Center

    Publication Year: 2012, Page(s): 781
    Request permission for commercial reuse | PDF file iconPDF (738 KB)
    Freely Available from IEEE
  • IEEE Computer Society OnlinePlus Publishing Model

    Publication Year: 2012, Page(s): 782
    Request permission for commercial reuse | PDF file iconPDF (1577 KB)
    Freely Available from IEEE
  • Stay Connected with the IEEE Computer Society [advertisement]

    Publication Year: 2012, Page(s): 783
    Request permission for commercial reuse | PDF file iconPDF (583 KB)
    Freely Available from IEEE
  • CPS Handles the Details for you [advertisement]

    Publication Year: 2012, Page(s): 784
    Request permission for commercial reuse | PDF file iconPDF (937 KB)
    Freely Available from IEEE
  • [Inside back cover]

    Publication Year: 2012, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2012, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University