By Topic

IEEE Systems Journal

Issue 2 • Date June 2013

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 2013, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1466 KB)
    Freely Available from IEEE
  • IEEE Systems Journal publication information

    Publication Year: 2013, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s): 177
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Guest Editorial

    Publication Year: 2013, Page(s): 178
    Request permission for commercial reuse | PDF file iconPDF (33 KB) | HTML iconHTML
    Freely Available from IEEE
  • An Experimental Evaluation of Robustness of Networks

    Publication Year: 2013, Page(s):179 - 188
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (830 KB) | HTML iconHTML

    Models of conflict in networks provide insights into applications ranging from epidemiology to guerilla warfare. Barabási, Albert, and Jeong modeled selective attacks on networks in which an attacker targets high-order nodes to destroy connectivity; Nagaraja and Anderson extended this to iterated attacks where the attacker and defender take turns removing and rebuilding nodes and edges acc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Privacy and Security Risks Analysis Construct for Identity Management Systems

    Publication Year: 2013, Page(s):189 - 198
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    This paper evaluates a taxonomy of privacy and security risks contributing factors with the Delphi method. The taxonomy was introduced in a previous work, and it is based on characteristics of tokens used in identity management systems (IDMSs). The taxonomy represents a construct for risk analysis in IDMSs. Constructs are concepts, terms, or vocabularies and symbols adopted or developed to describ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effectiveness of Probabilistic Attacks on Anonymity of Users Communicating via Multiple Messages

    Publication Year: 2013, Page(s):199 - 210
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    A major objective of any system-wide attack on an anonymity system is to uncover the extent to which each user of the system communicated with each other user. A probabilistic attack attempts to achieve this objective by arriving at some probability values for each of the system's possible input-output message pairs of reflecting actual communication. We show that these values lead to a probabilit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reclaiming Location Privacy in Mobile Telephony Networks—Effects and Consequences for Providers and Subscribers

    Publication Year: 2013, Page(s):211 - 222
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Mobile telephony (e.g., Global System for Mobile Communications [GSM]) is today's most common communication solution. Due to the specific characteristics of mobile communication infrastructure, it can provide real added value to the user and various other parties. Location information and mobility patterns of subscribers contribute not only to emergency planning, general safety, and security, but ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost-Effective Enforcement of Access and Usage Control Policies Under Uncertainties

    Publication Year: 2013, Page(s):223 - 235
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    In usage control, access decisions rely on mutable attributes. A reference monitor should reevaluate security policies each time attributes change their values. Identifying all attribute changes in a timely manner is a challenging issue, especially if the attribute provider and the reference monitor reside in different security domains. Some attribute changes might be missed, corrupted, and delaye... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lightweight Sybil Attack Detection in MANETs

    Publication Year: 2013, Page(s):236 - 248
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (591 KB) | HTML iconHTML

    Fully self-organized mobile ad hoc networks (MANETs) represent complex distributed systems that may also be part of a huge complex system, such as a complex system-of-systems used for crisis management operations. Due to the complex nature of MANETs and its resource constraint nodes, there has always been a need to develop lightweight security solutions. Since MANETs require a unique, distinct, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constant-Size Dynamic K-Times Anonymous Authentication

    Publication Year: 2013, Page(s):249 - 261
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Dynamic k-times anonymous authentication (k-TAA) schemes allow members of a group to be authenticated anonymously by application providers for a bounded number of times, where application providers can independently and dynamically grant or revoke access right to members in their own group. In this paper, we construct a dynamic k-TAA scheme with space and time complexities of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Biometric Authentication Using Mouse Gesture Dynamics

    Publication Year: 2013, Page(s):262 - 274
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3151 KB) | HTML iconHTML

    The mouse dynamics biometric is a behavioral biometric technology that extracts and analyzes the movement characteristics of the mouse input device when a computer user interacts with a graphical user interface for identification purposes. Most of the existing studies on mouse dynamics analysis have targeted primarily continuous authentication or user reauthentication for which promising results h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Policy Alignment: A Formal Approach

    Publication Year: 2013, Page(s):275 - 287
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1762 KB) | HTML iconHTML

    Security policy alignment concerns the matching of security policies specified at different levels in socio-technical systems, and delegated to different agents, technical and human. For example, the policy that sales data should not leave an organization is refined into policies on door locks, firewalls and employee behavior, and this refinement should be correct with respect to the original poli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault Tolerance Management in Cloud Computing: A System-Level Perspective

    Publication Year: 2013, Page(s):288 - 297
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    The increasing popularity of Cloud computing as an attractive alternative to classic information processing systems has increased the importance of its correct and continuous operation even in the presence of faulty components. In this paper, we introduce an innovative, system-level, modular perspective on creating and managing fault tolerance in Clouds. We propose a comprehensive high-level appro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • (Un)Suitability of Anonymous Communication Systems to WSN

    Publication Year: 2013, Page(s):298 - 310
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    Anonymous communication systems have been extensively studied by the research community to prevent the disclosure of sensitive information from the analysis of individuals' traffic patterns. Many remarkable solutions have been developed in this area, most of which have proven to be effective in the protection of user privacy against different types of attacks. Recently, the privacy preservation pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adversaries and Countermeasures in Privacy-Enhanced Urban Sensing Systems

    Publication Year: 2013, Page(s):311 - 322
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Today's digital society increasingly relies on the interconnection of heterogenous components, encompassing assorted actors, entities, systems, and a variety of (often mobile) computing devices. Revolutionary computing paradigms, such as people-centric urban sensing, have focused on the seamless collection of meaningful data from a large number of devices. The increasing complexity of deployed urb... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Logging as a Service—Delegating Log Management to the Cloud

    Publication Year: 2013, Page(s):323 - 334
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    Securely maintaining log records over extended periods of time is very important to the proper functioning of any organization. Integrity of the log files and that of the logging process need to be ensured at all times. In addition, as log files often contain sensitive information, confidentiality and privacy of log records are equally important. However, deploying a secure logging infrastructure ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of Virtual Machines Under Networked Denial of Service Attacks: Experiments and Analysis

    Publication Year: 2013, Page(s):335 - 345
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    The use of virtual machines (VMs) to provide computational infrastructure and services to organizations is increasingly prevalent in the modern IT industry. The growing use of this technology has been driven by a desire to increase utilization of resources through server consolidation. Virtualization has also made the dream of such utility computing platforms as cloud computing a reality. Today, v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open Access

    Publication Year: 2013, Page(s): 346
    Request permission for commercial reuse | PDF file iconPDF (1156 KB)
    Freely Available from IEEE
  • IEEE Xplore Digital Library

    Publication Year: 2013, Page(s): 347
    Request permission for commercial reuse | PDF file iconPDF (1793 KB)
    Freely Available from IEEE
  • IEEE Global History Network

    Publication Year: 2013, Page(s): 348
    Request permission for commercial reuse | PDF file iconPDF (3172 KB)
    Freely Available from IEEE
  • IEEE Systems Council Information

    Publication Year: 2013, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • IEEE Systems Journal information for authors

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Systems Journal is created to provide a systems-level focused forum for application-oriented manuscripts that address complex systems and system-of-systems of national and global significance

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Professor Vincenzo Piuri
Università degli Studi di Milano