Journal: IEEE Trans. Dependable Sec. Comput.

Volume 10, Issue 6

328 -- 340Abdullah Alamri, Peter Bertók, James A. Thom. Authorization Control for a Semantic Data Repository through an Inference Policy Engine
341 -- 354Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni. Discovery and Resolution of Anomalies in Web Access Control Policies
355 -- 367Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux. Formal Analysis of Secure Neighbor Discovery in Wireless Networks
368 -- 379Gang Chen, Hai Jin, Deqing Zou, Bing Bing Zhou, Zhenkai Liang, Weide Zheng, Xuanhua Shi. SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities
380 -- 393Abedelaziz Mohaisen, Denis Foo Kune, Eugene Y. Vasserman, Myungsun Kim, Yongdae Kim. Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs

Volume 10, Issue 5

251 -- 252Salvatore Distefano, Antonio Puliafito, Kishor S. Trivedi. Guest Editors' Introduction: Special Section on Cloud Computing Assessment: Metrics, Algorithms, Policies, Models, and Evaluation Techniques
253 -- 272Bernardetta Addis, Danilo Ardagna, Barbara Panicucci, Mark S. Squillante, Li Zhang 0002. A Hierarchical Approach for the Resource Management of Very Large Cloud Platforms
273 -- 286Fabien Hermenier, Julia L. Lawall, Gilles Muller. BtrPlace: A Flexible Consolidation Manager for Highly Available Applications
287 -- 300Chrysa A. Papagianni, Aris Leivadeas, Symeon Papavassiliou. A Cloud-Oriented Content Delivery Network Paradigm: Modeling and Assessment
301 -- 313Pedro Costa, Marcelo Pasin, Alysson Neves Bessani, Miguel P. Correia. On the Performance of Byzantine Fault-Tolerant MapReduce
314 -- 327Abhishek Verma, Ludmila Cherkasova, Roy H. Campbell. Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan

Volume 10, Issue 4

196 -- 197Salvatore Distefano, Antonio Puliafito, Kishor S. Trivedi. Guest Editors' Introduction: Special Section on Cloud Computing Assessment: Metrics, Algorithms, Policies, Models, and Evaluation Techniques
198 -- 211Chun-Jen Chung, Pankaj Khatkar, Tianyi Xing, Jeongkeun Lee, Dijiang Huang. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
212 -- 224Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, Ninja Marnau. Security and Privacy-Enhancing Multicloud Architectures
225 -- 238Yuriy Brun, Nenad Medvidovic. Entrusting Private Computation and Data to Untrusted Networks
239 -- 250Jiadi Yu, Peng Lu, Yanmin Zhu, Guangtao Xue, Minglu Li. Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data

Volume 10, Issue 3

129 -- 142Barbara Carminati, Elena Ferrari, Michele Guglielmi. A System for Timely and Controlled Information Sharing in Emergency Situations
143 -- 153Kui Xu, Patrick Butler, Sudip Saha, Danfeng (Daphne) Yao. DNS for Massive-Scale Command and Control
154 -- 167Rahul Raguram, Andrew M. White 0002, Yi Xu, Jan-Michael Frahm, Pierre Georgel, Fabian Monrose. On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections
168 -- 182Qinghua Li, Wei Gao, Sencun Zhu, Guohong Cao. To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks
183 -- 195Sangho Lee, Jong Kim. WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream

Volume 10, Issue 2

57 -- 69Di Ma, Nitesh Saxena, Tuo Xiang, Yan Zhu. Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing
70 -- 83Zhiyong Shan, Xin Wang 0001, Tzi-cker Chiueh. Malware Clearance for Secure Commitment of OS-Level Virtual Machines
84 -- 98Julien Freudiger, Mohammad Hossein Manshaei, Jean-Pierre Hubaux, David C. Parkes. Non-Cooperative Location Privacy
99 -- 113Joachim Biskup, Lan Li. On Inference-Proof View Processing of XML Documents
114 -- 127Lide Duan, Lu Peng, Bin Li. Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing

Volume 10, Issue 1

1 -- 13Willard Rafnsson, Keiko Nakata, Andrei Sabelfeld. Securing Class Initialization in Java-like Languages
14 -- 27Ahmet Burak Can, Bharat Bhargava. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
28 -- 39Mahesh V. Tripunitara, Ninghui Li. The Foundational Work of Harrison-Ruzzo-Ullman Revisited
40 -- 52Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo. Unprivileged Black-Box Detection of User-Space Keyloggers