Search dblp for Publications

export results for "toc:db/journals/tdsc/tdsc10.bht:"

 download as .bib file

@article{DBLP:journals/tdsc/AddisAPS013,
  author       = {Bernardetta Addis and
                  Danilo Ardagna and
                  Barbara Panicucci and
                  Mark S. Squillante and
                  Li Zhang},
  title        = {A Hierarchical Approach for the Resource Management of Very Large
                  Cloud Platforms},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {5},
  pages        = {253--272},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.4},
  doi          = {10.1109/TDSC.2013.4},
  timestamp    = {Sat, 02 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AddisAPS013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AlamriBT13,
  author       = {Abdullah Alamri and
                  Peter Bert{\'{o}}k and
                  James A. Thom},
  title        = {Authorization Control for a Semantic Data Repository through an Inference
                  Policy Engine},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {6},
  pages        = {328--340},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.20},
  doi          = {10.1109/TDSC.2013.20},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AlamriBT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BiskupL13,
  author       = {Joachim Biskup and
                  Lan Li},
  title        = {On Inference-Proof View Processing of {XML} Documents},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {2},
  pages        = {99--113},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2012.86},
  doi          = {10.1109/TDSC.2012.86},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BiskupL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BohliGJIM13,
  author       = {Jens{-}Matthias Bohli and
                  Nils Gruschka and
                  Meiko Jensen and
                  Luigi Lo Iacono and
                  Ninja Marnau},
  title        = {Security and Privacy-Enhancing Multicloud Architectures},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {4},
  pages        = {212--224},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.6},
  doi          = {10.1109/TDSC.2013.6},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BohliGJIM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BrunM13,
  author       = {Yuriy Brun and
                  Nenad Medvidovic},
  title        = {Entrusting Private Computation and Data to Untrusted Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {4},
  pages        = {225--238},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.13},
  doi          = {10.1109/TDSC.2013.13},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BrunM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CanB13,
  author       = {Ahmet Burak Can and
                  Bharat K. Bhargava},
  title        = {{SORT:} {A} Self-ORganizing Trust Model for Peer-to-Peer Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {1},
  pages        = {14--27},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2012.74},
  doi          = {10.1109/TDSC.2012.74},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CanB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CarminatiFG13,
  author       = {Barbara Carminati and
                  Elena Ferrari and
                  Michele Guglielmi},
  title        = {A System for Timely and Controlled Information Sharing in Emergency
                  Situations},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {3},
  pages        = {129--142},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.11},
  doi          = {10.1109/TDSC.2013.11},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CarminatiFG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChenJZZLZS13,
  author       = {Gang Chen and
                  Hai Jin and
                  Deqing Zou and
                  Bing Bing Zhou and
                  Zhenkai Liang and
                  Weide Zheng and
                  Xuanhua Shi},
  title        = {SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {6},
  pages        = {368--379},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.25},
  doi          = {10.1109/TDSC.2013.25},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChenJZZLZS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChungKXLH13,
  author       = {Chun{-}Jen Chung and
                  Pankaj Khatkar and
                  Tianyi Xing and
                  Jeongkeun Lee and
                  Dijiang Huang},
  title        = {{NICE:} Network Intrusion Detection and Countermeasure Selection in
                  Virtual Network Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {4},
  pages        = {198--211},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.8},
  doi          = {10.1109/TDSC.2013.8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChungKXLH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CostaPBC13,
  author       = {Pedro A. R. S. Costa and
                  Marcelo Pasin and
                  Alysson Neves Bessani and
                  Miguel P. Correia},
  title        = {On the Performance of Byzantine Fault-Tolerant MapReduce},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {5},
  pages        = {301--313},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.7},
  doi          = {10.1109/TDSC.2013.7},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CostaPBC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DistefanoPT13,
  author       = {Salvatore Distefano and
                  Antonio Puliafito and
                  Kishor S. Trivedi},
  title        = {Guest Editors' Introduction: Special Section on Cloud Computing Assessment:
                  Metrics, Algorithms, Policies, Models, and Evaluation Techniques},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {4},
  pages        = {196--197},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.27},
  doi          = {10.1109/TDSC.2013.27},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DistefanoPT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DistefanoPT13a,
  author       = {Salvatore Distefano and
                  Antonio Puliafito and
                  Kishor S. Trivedi},
  title        = {Guest Editors' Introduction: Special Section on Cloud Computing Assessment:
                  Metrics, Algorithms, Policies, Models, and Evaluation Techniques},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {5},
  pages        = {251--252},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.35},
  doi          = {10.1109/TDSC.2013.35},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DistefanoPT13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DuanPL13,
  author       = {Lide Duan and
                  Lu Peng and
                  Bin Li},
  title        = {Predicting Architectural Vulnerability on Multithreaded Processors
                  under Resource Contention and Sharing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {2},
  pages        = {114--127},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2012.87},
  doi          = {10.1109/TDSC.2012.87},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/DuanPL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FreudigerMHP13,
  author       = {Julien Freudiger and
                  Mohammad Hossein Manshaei and
                  Jean{-}Pierre Hubaux and
                  David C. Parkes},
  title        = {Non-Cooperative Location Privacy},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {2},
  pages        = {84--98},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2012.85},
  doi          = {10.1109/TDSC.2012.85},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/FreudigerMHP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HermenierLM13,
  author       = {Fabien Hermenier and
                  Julia Lawall and
                  Gilles Muller},
  title        = {BtrPlace: {A} Flexible Consolidation Manager for Highly Available
                  Applications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {5},
  pages        = {273--286},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.5},
  doi          = {10.1109/TDSC.2013.5},
  timestamp    = {Mon, 17 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/HermenierLM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuAK13,
  author       = {Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Ketan Kulkarni},
  title        = {Discovery and Resolution of Anomalies in Web Access Control Policies},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {6},
  pages        = {341--354},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.18},
  doi          = {10.1109/TDSC.2013.18},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HuAK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LeeK13,
  author       = {Sangho Lee and
                  Jong Kim},
  title        = {WarningBird: {A} Near Real-Time Detection System for Suspicious URLs
                  in Twitter Stream},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {3},
  pages        = {183--195},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.3},
  doi          = {10.1109/TDSC.2013.3},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LeeK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiGZC13,
  author       = {Qinghua Li and
                  Wei Gao and
                  Sencun Zhu and
                  Guohong Cao},
  title        = {To Lie or to Comply: Defending against Flood Attacks in Disruption
                  Tolerant Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {3},
  pages        = {168--182},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2012.84},
  doi          = {10.1109/TDSC.2012.84},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiGZC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaSXZ13,
  author       = {Di Ma and
                  Nitesh Saxena and
                  Tuo Xiang and
                  Yan Zhu},
  title        = {Location-Aware and Safer Cards: Enhancing {RFID} Security and Privacy
                  via Location Sensing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {2},
  pages        = {57--69},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2012.89},
  doi          = {10.1109/TDSC.2012.89},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaSXZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MohaisenKVKK13,
  author       = {Abedelaziz Mohaisen and
                  Denis Foo Kune and
                  Eugene Y. Vasserman and
                  Myungsun Kim and
                  Yongdae Kim},
  title        = {Secure Encounter-Based Mobile Social Networks: Requirements, Designs,
                  and Tradeoffs},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {6},
  pages        = {380--393},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.19},
  doi          = {10.1109/TDSC.2013.19},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/MohaisenKVKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/OrtolaniGC13,
  author       = {Stefano Ortolani and
                  Cristiano Giuffrida and
                  Bruno Crispo},
  title        = {Unprivileged Black-Box Detection of User-Space Keyloggers},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {1},
  pages        = {40--52},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2012.76},
  doi          = {10.1109/TDSC.2012.76},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/OrtolaniGC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PapagianniLP13,
  author       = {Chrysa Papagianni and
                  Aris Leivadeas and
                  Symeon Papavassiliou},
  title        = {A Cloud-Oriented Content Delivery Network Paradigm: Modeling and Assessment},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {5},
  pages        = {287--300},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.12},
  doi          = {10.1109/TDSC.2013.12},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/PapagianniLP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PoturalskiPH13,
  author       = {Marcin Poturalski and
                  Panos Papadimitratos and
                  Jean{-}Pierre Hubaux},
  title        = {Formal Analysis of Secure Neighbor Discovery in Wireless Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {6},
  pages        = {355--367},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.17},
  doi          = {10.1109/TDSC.2013.17},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/PoturalskiPH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RafnssonNS13,
  author       = {Willard Rafnsson and
                  Keiko Nakata and
                  Andrei Sabelfeld},
  title        = {Securing Class Initialization in Java-like Languages},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {1},
  pages        = {1--13},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2012.73},
  doi          = {10.1109/TDSC.2012.73},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RafnssonNS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Raguram0XFGM13,
  author       = {Rahul Raguram and
                  Andrew M. White and
                  Yi Xu and
                  Jan{-}Michael Frahm and
                  Pierre Georgel and
                  Fabian Monrose},
  title        = {On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction
                  of Typed Input from Compromising Reflections},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {3},
  pages        = {154--167},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.16},
  doi          = {10.1109/TDSC.2013.16},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/Raguram0XFGM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Shan0C13,
  author       = {Zhiyong Shan and
                  Xin Wang and
                  Tzi{-}cker Chiueh},
  title        = {Malware Clearance for Secure Commitment of OS-Level Virtual Machines},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {2},
  pages        = {70--83},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2012.88},
  doi          = {10.1109/TDSC.2012.88},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Shan0C13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TripunitaraL13,
  author       = {Mahesh V. Tripunitara and
                  Ninghui Li},
  title        = {The Foundational Work of Harrison-Ruzzo-Ullman Revisited},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {1},
  pages        = {28--39},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2012.77},
  doi          = {10.1109/TDSC.2012.77},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/TripunitaraL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VermaCC13,
  author       = {Abhishek Verma and
                  Ludmila Cherkasova and
                  Roy H. Campbell},
  title        = {Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {5},
  pages        = {314--327},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.14},
  doi          = {10.1109/TDSC.2013.14},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/VermaCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuBSY13,
  author       = {Kui Xu and
                  Patrick Butler and
                  Sudip Saha and
                  Danfeng (Daphne) Yao},
  title        = {{DNS} for Massive-Scale Command and Control},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {3},
  pages        = {143--153},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.10},
  doi          = {10.1109/TDSC.2013.10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuBSY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YuLZXL13,
  author       = {Jiadi Yu and
                  Peng Lu and
                  Yanmin Zhu and
                  Guangtao Xue and
                  Minglu Li},
  title        = {Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {4},
  pages        = {239--250},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.9},
  doi          = {10.1109/TDSC.2013.9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YuLZXL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics