By Topic

IEEE Transactions on Dependable and Secure Computing

Issue 6 • Date Nov.-Dec. 2012

Filter Results

Displaying Results 1 - 17 of 17
  • [Front cover]

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2012, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (148 KB)
    Freely Available from IEEE
  • A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks

    Publication Year: 2012, Page(s):785 - 797
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1227 KB) | HTML iconHTML

    For wireless multimedia sensor networks (WMSNs) deployed in noisy and unattended environments, it is necessary to establish a comprehensive framework that protects the accuracy of the gathered multimedia information. In this paper, we jointly consider data aggregation, information trust, and fault tolerance to enhance the correctness and trustworthiness of collected information. Based on the multi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attacks and Defenses in the Data Plane of Networks

    Publication Year: 2012, Page(s):798 - 810
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1419 KB) | HTML iconHTML

    Security issues in computer networks have focused on attacks on end systems and the control plane. An entirely new class of emerging network attacks aims at the data plane of the network. Data plane forwarding in network routers has traditionally been implemented with custom-logic hardware, but recent router designs increasingly use software-programmable network processors for packet forwarding. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?

    Publication Year: 2012, Page(s):811 - 824
    Cited by:  Papers (42)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2268 KB) | HTML iconHTML

    Twitter is a new web application playing dual roles of online social networking and microblogging. Users communicate with each other by publishing text-based posts. The popularity and open structure of Twitter have attracted a large number of automated programs, known as bots, which appear to be a double-edged sword to Twitter. Legitimate bots generate a large amount of benign tweets delivering ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks

    Publication Year: 2012, Page(s):825 - 837
    Cited by:  Papers (13)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1614 KB) | HTML iconHTML Multimedia Media

    The Common Vulnerability Scoring System (CVSS) is a widely used and well-established standard for classifying the severity of security vulnerabilities. For instance, all vulnerabilities in the US National Vulnerability Database (NVD) are scored according to this method. As computer systems typically have multiple vulnerabilities, it is often desirable to aggregate the score of individual vulnerabi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing Data Trustworthiness via Assured Digital Signing

    Publication Year: 2012, Page(s):838 - 851
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1041 KB) | HTML iconHTML

    Digital signatures are an important mechanism for ensuring data trustworthiness via source authenticity, integrity, and source nonrepudiation. However, their trustworthiness guarantee can be subverted in the real world by sophisticated attacks, which can obtain cryptographically legitimate digital signatures without actually compromising the private signing key. This problem cannot be adequately a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jamming-Resilient Multipath Routing

    Publication Year: 2012, Page(s):852 - 864
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3981 KB) | HTML iconHTML

    Jamming attacks are especially harmful to the reliability of wireless communication, as they can effectively disrupt communication between any node pairs. Existing jamming defenses primarily focus on repairing connectivity between adjacent nodes. In this paper, we address jamming at the network level and focus on restoring the end-to-end data delivery through multipath routing. As long as all path... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Energy Security of Server Systems

    Publication Year: 2012, Page(s):865 - 876
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1895 KB)

    Power management has become increasingly important for server systems. Numerous techniques have been proposed and developed to optimize server power consumption and achieve energy proportional computing. However, the security perspective of server power management has not yet been studied. In this paper, we investigate energy attacks, a new type of malicious exploits on server systems. Targeted so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks

    Publication Year: 2012, Page(s):877 - 889
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB) | HTML iconHTML

    Social networks are attracting significant interest from researchers in different domains, especially with the advent of social networking systems which enable large-scale collection of network information. However, as much as analysis of such social networks can benefit researchers, it raises serious privacy concerns for the people involved in them. To address such privacy concerns, several techn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Network Covert Communications Based on TCP and Enumerative Combinatorics

    Publication Year: 2012, Page(s):890 - 902
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3830 KB) | HTML iconHTML Multimedia Media

    The problem of communicating covertly over the Internet has recently received considerable attention from both industry and academic communities. However, the previously proposed network covert channels are plagued by their unreliability and very low data rate. In this paper, we show through a new class of timing channels coined as Cloak that it is possible to devise a 100 percent reliable covert ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Overlay Cloud Storage with Access Control and Assured Deletion

    Publication Year: 2012, Page(s):903 - 916
    Cited by:  Papers (37)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1126 KB) | HTML iconHTML

    We can now outsource data backups off-site to third-party cloud storage services so as to reduce data management costs. However, we must provide security guarantees for the outsourced data, which is now maintained by third parties. We design and implement FADE, a secure overlay cloud storage system that achieves fine-grained, policy-based access control and file assured deletion. It associates out... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Surviving Attacks in Challenged Networks

    Publication Year: 2012, Page(s):917 - 929
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1262 KB) | HTML iconHTML

    In the event of a disaster, telecommunication infrastructures can be severely damaged or overloaded. Hastily formed networks can provide communication services in an ad hoc manner. These networks are challenging due to the chaotic context where intermittent connection is the norm and the identity and number of participants cannot be assumed. In such environments malicious actors may try to disrupt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviors

    Publication Year: 2012, Page(s):930 - 943
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2286 KB) | HTML iconHTML

    The growth in the use of Smartphones and other mobile computing devices continues to grow rapidly. As mobile wireless communications become ubiquitous, the networks and systems that depend upon them will become more complex. In parallel with this, the spread of digital viruses and malicious content will be an ever increasing threat within this interconnected paradigm requiring counteracting mechan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TDSC Call for Papers

    Publication Year: 2012, Page(s): 944
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • [Information for authors]

    Publication Year: 2012, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (148 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2012, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University