Journal: IEEE Trans. Dependable Sec. Comput.

Volume 9, Issue 6

785 -- 797Yan Sun, Hong Luo, Sajal K. Das. A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks
798 -- 810Danai Chasaki, Tilman Wolf. Attacks and Defenses in the Data Plane of Networks
811 -- 824Zi Chu, Steven Gianvecchio, Haining Wang, Sushil Jajodia. Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
825 -- 837Hannes Holm, Mathias Ekstedt, Dennis Andersson. Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks
838 -- 851Weiqi Dai, T. Paul Parker, Hai Jin, Shouhuai Xu. Enhancing Data Trustworthiness via Assured Digital Signing
852 -- 864Hossen A. Mustafa, Xin Zhang 0003, Zhenhua Liu, Wenyuan Xu, Adrian Perrig. Jamming-Resilient Multipath Routing
865 -- 876Zhenyu Wu, Mengjun Xie, Haining Wang. On Energy Security of Server Systems
877 -- 889Amirreza Masoumzadeh, James Joshi. Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks
890 -- 902Xiapu Luo, Edmond W. W. Chan, Peng Zhou, Rocky K. C. Chang. Robust Network Covert Communications Based on TCP and Enumerative Combinatorics
903 -- 916Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia Perlman. Secure Overlay Cloud Storage with Access Control and Assured Deletion
917 -- 929Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehrani, Tiziano Santoro. Surviving Attacks in Challenged Networks
930 -- 943Jennifer T. Jackson, Sadie Creese. Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviors

Volume 9, Issue 5

625 -- 626Elena Ferrari, Bhavani M. Thuraisingham. Guest Editors' Introduction: Special Section on Data and Applications Security and Privacy
627 -- 640Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino. Privacy-Preserving Enforcement of Spatially Aware RBAC
641 -- 654David Rebollo-Monedero, Jordi Forné, Josep Domingo-Ferrer. Query Profile Obfuscation by Means of Optimal Query Exchange between Users
655 -- 669Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Yuan Hong. Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition
670 -- 683Steve Barker, Valerio Genovese. Access Control with Privacy Enhancements a Unified Approach
684 -- 698Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Elisa Bertino. A Hybrid Approach to Private Record Matching
699 -- 713Santosh Chandrasekhar, Saikat Chakrabarti 0002, Mukesh Singhal. A Trapdoor Hash-Based Mechanism for Stream Authentication
714 -- 726Roberto Perdisci, Igino Corona, Giorgio Giacinto. Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis
727 -- 740Javier Herranz, Jordi Nin, Marc Solé. More Hybrid and Secure Protection of Statistical Data Sets
741 -- 755Jing Dong, Reza Curtmola, Cristina Nita-Rotaru, David K. Y. Yau. Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems
756 -- 769Hoon Wei Lim, Florian Kerschbaum, Huaxiong Wang. Workflow Signatures for Business Process Compliance
770 -- 776Xiaodao Chen, Chen Liao, Tongquan Wei, Shiyan Hu. An Interconnect Reliability-Driven Routing Technique for Electromigration Failure Avoidance

Volume 9, Issue 4

449 -- 450Christos Dimitrakakis, Tom Karygiannis, Aikaterini Mitrokotsa. Guest Editors' Introduction: Special Section on Learning, Games, and Security
451 -- 462Robert Nix, Murat Kantarcioglu. Incentive Compatible Privacy-Preserving Distributed Classification
463 -- 469Manas A. Pathak, Bhiksha Raj. Large Margin Gaussian Mixture Models with Differential Privacy
470 -- 481Ye Zhu, Yuanchao Lu, Anil Vikram. On Privacy of Encrypted Speech Communications
482 -- 493Adam Barth, Benjamin I. P. Rubinstein, Mukund Sundararajan, John C. Mitchell, Dawn Song, Peter L. Bartlett. A Learning-Based Approach to Reactive Security
494 -- 511Jun-Won Ho, Matthew Wright, Sajal K. Das. ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing
512 -- 525Meixing Le, Angelos Stavrou, Brent ByungHoon Kang. DoubleGuard: Detecting Intrusions in Multitier Web Applications
526 -- 540Dianxiang Xu, Manghui Tu, Michael Sanford, Lijo Thomas, Daniel Woodraska, Weifeng Xu. Automated Security Test Generation with Formal Threat Models
541 -- 555Zhiyong Shan, Xin Wang 0001, Tzi-cker Chiueh. Enforcing Mandatory Access Control in Commodity OS to Disable Malware
556 -- 568Smitha Sundareswaran, Anna Cinzia Squicciarini, Dan Lin. Ensuring Distributed Accountability for Data Sharing in the Cloud
569 -- 582Alessandro Mei, Julinda Stefa. Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals
583 -- 596Mohamed Shehab, Said Marouf. Recommendation Models for Open Authorization
597 -- 609Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino. Resilient Authenticated Execution of Critical Applications in Untrusted Environments
610 -- 625Roberto Cortiñas, Felix C. Freiling, Marjan Ghajar-Azadanlou, Alberto Lafuente, Mikel Larrea, Lucia Draque Penso, Iratxe Soraluze Arriola. Secure Failure Detection and Consensus in TrustedPals

Volume 9, Issue 3

305 -- 317Matt Bishop, Sophie Engle, Damien Howard, Sean Whalen. A Taxonomy of Buffer Overflow Characteristics
318 -- 331Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni. Detecting and Resolving Firewall Policy Anomalies
332 -- 344You Chen, Steve Nyemba, Bradley Malin. Detecting Anomalous Insiders in Collaborative Information Systems
345 -- 360Ernie Brickell, Jiangtao Li. Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities
361 -- 374Xiaojun Ruan, Qing Yang, Mohammed I. Alghamdi, Shu Yin, Xiao Qin. ES-MPICH2: A Message Passing Interface with Enhanced Security
375 -- 386Erman Ayday, Faramarz Fekri. Iterative Trust and Reputation Management Using Belief Propagation
387 -- 400Daniele Riboni, Linda Pareschi, Claudio Bettini. JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks
401 -- 413Zhang Fu, Marina Papatriantafilou, Philippas Tsigas. Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts
414 -- 428Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici. M-Score: A Misuseability Weight Measure
429 -- 442Wenjuan Xu, Xinwen Zhang, Hongxin Hu, Gail-Joon Ahn, Jean-Pierre Seifert. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
443 -- 446Huaqun Wang, Yuqing Zhang. On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks

Volume 9, Issue 2

145 -- 158Rodrigo Rodrigues, Barbara Liskov, Kathryn Chen, Moses Liskov, David A. Schultz. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
159 -- 172Antonio Martínez-Álvarez, Sergio Cuenca-Asensi, Felipe Restrepo-Calle, Francisco R. Palomo, Hipólito Guzmán-Miranda, Miguel A. Aguirre. Compiler-Directed Soft Error Mitigation for Embedded Systems
173 -- 183Kui Xu, Huijun Xiong, Chehai Wu, Deian Stefan, Danfeng Yao. Data-Provenance Verification For Secure Hosts
184 -- 197Guoxing Zhan, Weisong Shi, Julia Deng. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
198 -- 210Zhenhai Duan, Peng Chen 0006, Fernando Sanchez, Yingfei Dong, Mary Stephenson, James Michael Barker. Detecting Spam Zombies by Monitoring Outgoing Messages
211 -- 221Qiming Li, John C. S. Lui, Dah-Ming Chiu. On the Security and Efficiency of Content Distribution via Network Coding
222 -- 235Sonia Chiasson, Elizabeth Stobert, Alain Forget, Robert Biddle, Paul C. van Oorschot. Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism
236 -- 249Fatemeh Borran, Martin Hutle, Nuno Santos, André Schiper. Quantitative Analysis of Consensus Algorithms
250 -- 260Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, Ruoyu Wu. Risk-Aware Mitigation for MANET Routing Attacks
261 -- 274Anupam Das, Mohammad Mahfuzul Islam. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems
275 -- 288Shlomi Dolev, Yinnon A. Haviv. Stabilization Enabling Technology
289 -- 302Yanjun Zuo. Survivability Experiment and Attack Characterization for RFID
303 -- 304Xun Yi. Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting

Volume 9, Issue 1

1 -- 0Ravi S. Sandhu. Editorial
2 -- 15Casey M. Jeffery, Renato J. O. Figueiredo. A Flexible Approach to Improving System Reliability with Virtual Lockstep
16 -- 29Anna Cinzia Squicciarini, Elisa Bertino, Alberto Trombetta, Stefano Braghin. A Flexible Approach to Multisession Trust Negotiations
30 -- 45Shouhuai Xu, Wenlian Lu, Zhenxin Zhan. A Stochastic Model of Multivirus Dynamics
46 -- 60Nai-Wen Chang, Sun-Yuan Hsieh. Conditional Diagnosability of Augmented Cubes under the PMC Model
61 -- 74Nayot Poolsappasit, Rinku Dewri, Indrajit Ray. Dynamic Security Risk Management Using Bayesian Attack Graphs
75 -- 85Nwokedi C. Idika, Bharat K. Bhargava. Extending Attack Graph-Based Security Metrics and Aggregating Their Application
86 -- 100Andreas Merentitis, Nektarios Kranitis, Antonis M. Paschalis, Dimitris Gizopoulos. Low Energy Online Self-Test of Embedded Processors in Dependable WSN Nodes
101 -- 114Alejandro Proaño, Loukas Lazos. Packet-Hiding Methods for Preventing Selective Jamming Attacks
115 -- 127Stavros Papadopoulos, Spiridon Bakiras, Dimitris Papadias. pCloud: A Distributed System for Practical PIR
128 -- 141Mansour Alsaleh, Mohammad Mannan, Paul C. van Oorschot. Revisiting Defenses against Large-Scale Online Password Guessing Attacks