By Topic

IEEE Transactions on Dependable and Secure Computing

Issue 1 • Jan.-Feb. 2013

Filter Results

Displaying Results 1 - 6 of 6
  • Securing Class Initialization in Java-like Languages

    Publication Year: 2013, Page(s):1 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1465 KB)

    Language-based information-flow security is concerned with specifying and enforcing security policies for information flow via language constructs. Although much progress has been made on understanding information flow in object-oriented programs, little attention has been given to the impact of class initialization on information flow. This paper turns the spotlight on security implications of cl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems

    Publication Year: 2013, Page(s):14 - 27
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1361 KB) | HTML iconHTML Multimedia Media

    Open nature of peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can mitigate attacks of malicious peers. This paper presents distributed algorithms that enable a peer to reason about trustworthiness of other peers based on past interactions and recommendations. Peers create their own trust network in their proximity by using local information availa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Foundational Work of Harrison-Ruzzo-Ullman Revisited

    Publication Year: 2013, Page(s):28 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB) | HTML iconHTML

    The work by Harrison, Ruzzo, and Ullman (the HRU paper) on safety in the context of the access matrix model is widely considered to be foundational work in access control. In this paper, we address two errors we have discovered in the HRU paper. To our knowledge, these errors have not been previously reported in the literature. The first error regards a proof that shows that safety analysis for mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unprivileged Black-Box Detection of User-Space Keyloggers

    Publication Year: 2013, Page(s):40 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1692 KB) | HTML iconHTML

    Software keyloggers are a fast growing class of invasive software often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unprivileged programs running in user space to eavesdrop and record all the keystrokes typed by the users of a system. The ability to run in unprivileged mode facilitates their implementation and distribution, but, at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2012 Reviewers List

    Publication Year: 2013, Page(s):53 - 55
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • 2012 Annual Index

    Publication Year: 2013, Page(s): Not in print
    Request permission for commercial reuse | PDF file iconPDF (395 KB)
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University