Journal: IEEE Trans. Dependable Sec. Comput.

Volume 8, Issue 6

785 -- 797Steven Gianvecchio, Haining Wang. An Entropy-Based Approach to Detecting Covert Timing Channels
798 -- 809Juan A. Carrasco, Víctor Suñé. A Numerical Method for the Evaluation of the Distribution of Cumulative Reward till Exit of a Subset of Transient States of a Markov Reward Model
810 -- 823Zheng Yan, Christian Prehofer. Autonomic Trust Management for a Component-Based Software System
824 -- 838Levente Buttyán, László Czap, István Vajda. Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes
839 -- 851Kenichi Kourai, Shigeru Chiba. Fast Software Rejuvenation of Virtual Machine Monitors
852 -- 865Hejiao Huang, Hélène Kirchner. Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets
866 -- 882Vadim Drabkin, Roy Friedman, Gabriel Kliot, Marc Segal. On Reliable Dissemination in Wireless Ad Hoc Networks
883 -- 897Yuqing Sun, Qihua Wang, Ninghui Li, Elisa Bertino, Mikhail J. Atallah. On the Complexity of Authorization in RBAC under Qualification and Security Constraints
898 -- 912Giorgio Calandriello, Panos Papadimitratos, Jean-Pierre Hubaux, Antonio Lioy. On the Performance of Secure Vehicular Communication Systems
913 -- 928Kaustubh R. Joshi, Matti A. Hiltunen, William H. Sanders, Richard D. Schlichting. Probabilistic Model-Driven Recovery in Distributed Systems
929 -- 937Jiang Wu, Douglas R. Stinson. Three Improved Algorithms for Multipath Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission
938 -- 943Senthilkumar Chinnappa Gounder Periaswamy, Dale R. Thompson, Jia Di. Fingerprinting RFID Tags

Volume 8, Issue 5

625 -- 639Richard Ekwall, André Schiper. A Fault-Tolerant Token-Based Atomic Broadcast Algorithm
640 -- 655Karthik Pattabiraman, Giacinto Paolo Saggese, Daniel Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer. Automated Derivation of Application-Specific Error Detectors Using Dynamic Analysis
656 -- 669Hao Yang, Eric Osterweil, Daniel Massey, Songwu Lu, Lixia Zhang. Deploying Cryptography in Internet-Scale Systems: A Case Study on DNSSEC
670 -- 684Arati Baliga, Vinod Ganapathy, Liviu Iftode. Detecting Kernel-Level Rootkits Using Data Structure Invariants
685 -- 698Mauro Conti, Roberto Di Pietro, Luigi Vincenzo Mancini, Alessandro Mei. Distributed Detection of Clone Attacks in Wireless Sensor Networks
699 -- 713Ali Al Shidhani, Victor C. M. Leung. Fast and Secure Reauthentications for 3GPP Subscribers during WiMAX-WLAN Handovers
714 -- 727Omer Khan, Sandip Kundu. Hardware/Software Codesign Architecture for Online Testing in Chip Multiprocessors
728 -- 741Robin Snader, Nikita Borisov. Improving Security and Performance in the Tor Network through Tunable Path Selection
742 -- 755Carmela Troncoso, George Danezis, Eleni Kosta, Josep Balasch, Bart Preneel. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
756 -- 769Yu Wang, Hong Luo, Ku He, Rong Luo, Huazhong Yang, Yuan Xie. Temperature-Aware NBTI Modeling and the Impact of Standby Leakage Reduction Techniques on Circuit Performance Degradation
770 -- 776Tieyan Li, Guilin Wang. Analyzing a Family of Key Protection Schemes against Modification Attacks
777 -- 782Dionysia K. Petraki, Markos P. Anastasopoulos, Symeon Papavassiliou. Secrecy Capacity for Satellite Networks under Rain Fading

Volume 8, Issue 4

481 -- 493Ge-Ming Chiu, Jane-Ferng Chiu. A New Diskless Checkpointing Approach for Multiple Processor Failures
494 -- 509Federico Simmross-Wattenberg, Juan I. Asensio-Pérez, Pablo Casaseca-de-la-Higuera, Marcos Martín-Fernández, Ioannis A. Dimitriadis, Carlos Alberola-López. Anomaly Detection in Network Traffic Based on Statistical Inference and alpha-Stable Modeling
510 -- 522Miao Jiang, Mohammad Ahmad Munawar, Thomas Reidemeister, Paul A. S. Ward. Efficient Fault Detection and Diagnosis in Complex Software Systems with Information-Theoretic Monitoring
523 -- 536Issa Khalil. ELMO: Energy Aware Local Monitoring in Sensor Networks
537 -- 547Ilia Polian, John P. Hayes, Sudhakar M. Reddy, Bernd Becker. Modeling and Mitigating Transient Errors in Logic Circuits
548 -- 563Paolo D Arco, Alfredo De Santis. On Ultralightweight RFID Authentication Protocols
564 -- 577Yair Amir, Brian A. Coan, Jonathan Kirsch, John Lane. Prime: Byzantine Replication under Attack
578 -- 587Alberto Trombetta, Wei Jiang, Elisa Bertino, Lorenzo Bossi. Privacy-Preserving Updates to Anonymous and Confidential Databases
588 -- 601Babak Salamat, Todd Jackson, Gregor Wagner, Christian Wimmer, Michael Franz. Runtime Defense against Code Injection Attacks Using Replicated Execution
602 -- 616Christopher Ferguson, Qijun Gu. Self-Healing Control Flow Protection in Sensor Applications
617 -- 623Krishna K. Ramachandran, Biplab Sikdar. Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks

Volume 8, Issue 3

321 -- 336Gang Xu, Cristian Borcea, Liviu Iftode. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
337 -- 352Jianneng Cao, Barbara Carminati, Elena Ferrari, Kian-Lee Tan. CASTLE: Continuously Anonymizing Data Streams
353 -- 362Chia-Wei Lee, Sun-Yuan Hsieh. Determining the Diagnosability of (1, 2)-Matching Composition Networks and Its Applications
363 -- 376Kealan McCusker, Noel E. O Connor. Low-Energy Symmetric Key Distribution in Wireless Sensor Networks
377 -- 390Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao. Modeling and Detection of Camouflaging Worm
391 -- 403Refik Samet. Recovery Device for Real-Time Dual-Redundant Computer Systems
404 -- 418K. K. Rao, James Lee Hafner, Richard A. Golding. Reliability for Networked Storage Nodes
419 -- 433Cyrus Harvesf, Douglas M. Blough. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
434 -- 449Xinyuan Wang, Douglas S. Reeves. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
450 -- 465Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia. Securing Topology Maintenance Protocols for Sensor Networks
466 -- 480Erik-Oliver Blass, Anil Kurmus, Refik Molva, Guevara Noubir, Abdullatif Shikfa. The F_f-Family of Protocols for RFID-Privacy and Authentication

Volume 8, Issue 2

161 -- 176Ing-Ray Chen, Anh Phan Speer, Mohamed Eltoweissy. Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
177 -- 193Marco Serafini, Péter Bokor, Neeraj Suri, Jonny Vinter, Astrit Ademaj, Wolfgang Brandstätter, Fulvio Tagliabo, Jens Koch. Application-Level Diagnostic and Membership Protocols for Generic Time-Triggered Systems
194 -- 206Dennis Heimbigner. A Tamper-Resistant Programming Language System
207 -- 217Jacques Henri Collet, Piotr Zajac, Mihalis Psarakis, Dimitris Gizopoulos. Chip Self-Organization and Fault Tolerance in Massively Defective Multicore Arrays
218 -- 232Jelena Mirkovic, Ezra Kissel. Comparative Evaluation of Spoofing Defenses
233 -- 245John Felix Charles Joseph, Bu-Sung Lee, Amitabha Das, Boon-Chong Seet. Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA
246 -- 255Sun-Yuan Hsieh, Chia-Wei Lee. Diagnosability of Two-Matching Composition Networks under the MM:::ast::: Model
256 -- 269Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sean W. Smith. Nymble: Blocking Misbehaving Users in Anonymizing Networks
270 -- 281Sascha Grau, Mathias Fischer, Michael Brinkmeier, Günter Schäfer. On Complexity and Approximability of Optimal DoS Attacks on Multiple-Tree P2P Streaming Topologies
282 -- 294Alexander Hofmann, Bernhard Sick. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
295 -- 307Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fang. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
308 -- 314Marta Portela-García, Celia López-Ongil, Mario García-Valderas, Luis Entrena. Fault Injection in Modern Microprocessors Using On-Chip Debugging Infrastructures
315 -- 317Hung-Min Sun, Wei-Chih Ting, King-Hang Wang. On the Security of Chien s Ultralightweight RFID Authentication Protocol

Volume 8, Issue 1

1 -- 12Beat Gfeller, Nicola Santoro, Peter Widmayer. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum-Diameter Spanning Tree
13 -- 27Claudio Agostino Ardagna, Marco Cremonini, Sabrina De Capitani di Vimercati, Pierangela Samarati. An Obfuscation-Based Approach for Protecting Location Privacy
28 -- 43Xiaohu Li, Timothy Paul Parker, Shouhuai Xu. A Stochastic Model for Quantitative Security Analyses of Networked Systems
44 -- 57Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer. Automated Derivation of Application-Aware Error Detectors Using Static Analysis: The Trusted Illiac Approach
58 -- 73Bezawada Bruhadeshwar, Sandeep S. Kulkarni. Balancing Revocation and Storage Trade-Offs in Secure Group Communication
74 -- 88Dong Xiang. Deadlock-Free Adaptive Routing in Meshes with Fault-Tolerance Ability Based on Channel Overlapping
89 -- 103Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya. Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
104 -- 121Paolo Romano, Francesco Quaglia. Providing e-Transaction Guarantees in Asynchronous Systems with No Assumptions on the Accuracy of Failure Detection
122 -- 136Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo. RITAS: Services for Randomized Intrusion Tolerance
137 -- 146Feng Wang 0004, Yuan Xie. Soft Error Rate Analysis for Combinational Logic Using an Accurate Electrical Masking Model
147 -- 159Dmitry Rovniagin, Avishai Wool. The Geometric Efficient Matching Algorithm for Firewalls