default search action
IEEE Transactions on Dependable and Secure Computing, Volume 10
Volume 10, Number 1, January - February 2013
- Willard Rafnsson, Keiko Nakata, Andrei Sabelfeld:
Securing Class Initialization in Java-like Languages. 1-13 - Ahmet Burak Can, Bharat K. Bhargava:
SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems. 14-27 - Mahesh V. Tripunitara, Ninghui Li:
The Foundational Work of Harrison-Ruzzo-Ullman Revisited. 28-39 - Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo:
Unprivileged Black-Box Detection of User-Space Keyloggers. 40-52
Volume 10, Number 2, March - April 2013
- Di Ma, Nitesh Saxena, Tuo Xiang, Yan Zhu:
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing. 57-69 - Zhiyong Shan, Xin Wang, Tzi-cker Chiueh:
Malware Clearance for Secure Commitment of OS-Level Virtual Machines. 70-83 - Julien Freudiger, Mohammad Hossein Manshaei, Jean-Pierre Hubaux, David C. Parkes:
Non-Cooperative Location Privacy. 84-98 - Joachim Biskup, Lan Li:
On Inference-Proof View Processing of XML Documents. 99-113 - Lide Duan, Lu Peng, Bin Li:
Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing. 114-127
Volume 10, Number 3, May - June 2013
- Barbara Carminati, Elena Ferrari, Michele Guglielmi:
A System for Timely and Controlled Information Sharing in Emergency Situations. 129-142 - Kui Xu, Patrick Butler, Sudip Saha, Danfeng (Daphne) Yao:
DNS for Massive-Scale Command and Control. 143-153 - Rahul Raguram, Andrew M. White, Yi Xu, Jan-Michael Frahm, Pierre Georgel, Fabian Monrose:
On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections. 154-167 - Qinghua Li, Wei Gao, Sencun Zhu, Guohong Cao:
To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks. 168-182 - Sangho Lee, Jong Kim:
WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream. 183-195
Volume 10, Number 4, July - August 2013
- Salvatore Distefano, Antonio Puliafito, Kishor S. Trivedi:
Guest Editors' Introduction: Special Section on Cloud Computing Assessment: Metrics, Algorithms, Policies, Models, and Evaluation Techniques. 196-197 - Chun-Jen Chung, Pankaj Khatkar, Tianyi Xing, Jeongkeun Lee, Dijiang Huang:
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. 198-211 - Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, Ninja Marnau:
Security and Privacy-Enhancing Multicloud Architectures. 212-224 - Yuriy Brun, Nenad Medvidovic:
Entrusting Private Computation and Data to Untrusted Networks. 225-238 - Jiadi Yu, Peng Lu, Yanmin Zhu, Guangtao Xue, Minglu Li:
Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data. 239-250
Volume 10, Number 5, September - October 2013
- Salvatore Distefano, Antonio Puliafito, Kishor S. Trivedi:
Guest Editors' Introduction: Special Section on Cloud Computing Assessment: Metrics, Algorithms, Policies, Models, and Evaluation Techniques. 251-252 - Bernardetta Addis, Danilo Ardagna, Barbara Panicucci, Mark S. Squillante, Li Zhang:
A Hierarchical Approach for the Resource Management of Very Large Cloud Platforms. 253-272 - Fabien Hermenier, Julia Lawall, Gilles Muller:
BtrPlace: A Flexible Consolidation Manager for Highly Available Applications. 273-286 - Chrysa Papagianni, Aris Leivadeas, Symeon Papavassiliou:
A Cloud-Oriented Content Delivery Network Paradigm: Modeling and Assessment. 287-300 - Pedro A. R. S. Costa, Marcelo Pasin, Alysson Neves Bessani, Miguel P. Correia:
On the Performance of Byzantine Fault-Tolerant MapReduce. 301-313 - Abhishek Verma, Ludmila Cherkasova, Roy H. Campbell:
Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan. 314-327
Volume 10, Number 6, November - December 2013
- Abdullah Alamri, Peter Bertók, James A. Thom:
Authorization Control for a Semantic Data Repository through an Inference Policy Engine. 328-340 - Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni:
Discovery and Resolution of Anomalies in Web Access Control Policies. 341-354 - Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux:
Formal Analysis of Secure Neighbor Discovery in Wireless Networks. 355-367 - Gang Chen, Hai Jin, Deqing Zou, Bing Bing Zhou, Zhenkai Liang, Weide Zheng, Xuanhua Shi:
SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities. 368-379 - Abedelaziz Mohaisen, Denis Foo Kune, Eugene Y. Vasserman, Myungsun Kim, Yongdae Kim:
Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs. 380-393
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.