By Topic

IEEE Transactions on Dependable and Secure Computing

Issue 2 • Date March-April 2013

Filter Results

Displaying Results 1 - 6 of 6
  • Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing

    Publication Year: 2013, Page(s):57 - 69
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (876 KB)

    In this paper, we report on a new approach for enhancing security and privacy in certain RFID applications whereby location or location-related information (such as speed) can serve as a legitimate access context. Examples of these applications include access cards, toll cards, credit cards, and other payment tokens. We show that location awareness can be used by both tags and back-end servers for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Malware Clearance for Secure Commitment of OS-Level Virtual Machines

    Publication Year: 2013, Page(s):70 - 83
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1553 KB) | HTML iconHTML

    A virtual machine(VM) can be simply created upon use and disposed upon the completion of the tasks or the detection of error. The disadvantage of this approach is that if there is no malicious activity, the user has to redo all of the work in her actual workspace since there is no easy way to commit (i.e., merge) only the benign updates within the VM back to the host environment. In this work, we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-Cooperative Location Privacy

    Publication Year: 2013, Page(s):84 - 98
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (693 KB) | HTML iconHTML

    In mobile networks, authentication is a required primitive for most security protocols. Unfortunately, an adversary can monitor pseudonyms used for authentication to track the location of mobile nodes. A frequently proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones. This approach is costly. Self-interested mobil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Inference-Proof View Processing of XML Documents

    Publication Year: 2013, Page(s):99 - 113
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1110 KB) | HTML iconHTML Multimedia Media

    This work aims at treating the inference problem in XML documents that are assumed to represent potentially incomplete information. The inference problem consists in providing a control mechanism for enforcing inference-usability confinement of XML documents. More formally, an inference-proof view of an XML document is required to be both indistinguishable from the actual XML document to the clien... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing

    Publication Year: 2013, Page(s):114 - 127
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1827 KB) | HTML iconHTML

    Architectural vulnerability factor (AVF) characterizes a processor's vulnerability to soft errors. Interthread resource contention and sharing on a multithreaded processor (e.g., SMT, CMP) shows nonuniform impact on a program's AVF when it is co-scheduled with different programs. However, measuring the AVF is extremely expensive in terms of hardware and computation. This paper proposes a scalable ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Open Access Publishing

    Publication Year: 2013, Page(s): 128
    Request permission for commercial reuse | PDF file iconPDF (413 KB)
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University