IEEE Transactions on Dependable and Secure Computing

TDSC Seeks Editor-in-Chief for 2018-2020 Term

The IEEE Computer Society seeks applicants for the position of editor-in-chief of the IEEE Transactions on Dependable and Secure Computing, serving a three-year term starting 1 January 2018. Prospective candidates are asked to provide a complete curriculum vitae, a brief plan for the publication's future, and a letter of support from their institution or employer (as PDF files) by 1 March 2017. For more information on the search process and to submit application materials, click here or please contact: Kimberly Sperka, ksperka@computer.org.


IEEE Transactions on Dependable and Secure Computing (TDSC) is a bimonthly journal that publishes archival research results focusing on foundations, methodologies, and mechanisms that support the achievement—through design, modeling, and evaluation—of systems and networks that are dependable and secure to the desired degree without compromising performance. Read the full scope of TDSC


Expand your horizons with Colloquium, a monthly survey of abstracts from all CS transactions! Replaces OnlinePlus in January 2017.


From the November/December 2016 issue

Detection of Unspecified Emergencies for Controlled Information Sharing

By Barbara Carminati, Elena Ferrari, and Michele Guglielmi

Featured article thumbnail imageDuring emergency situations one of the key requirements to handle the crisis is information sharing among organizations involved in the emergency management. When emergency situations are well known, it is possible to specify a priori these situations and to plan the information sharing needs in advance. However, there are many situations where it is not possible to describe these emergencies and their information sharing requirements beforehand. Therefore, in this paper, we present a framework able to deal with both specified and unspecified emergencies. The idea is to detect unspecified emergencies and related information sharing needs through denied access request analysis, anomaly detection techniques, and analysis of the history of permitted access requests. Besides presenting the techniques, the paper also presents experiments to verify their effectiveness.

download PDF View the PDF of this article      csdl View this issue in the digital library


Editorials and Announcements

Announcements

Call for Papers


Editorials


Guest Editorials


Reviewers List


Annual Index


Access recently published TDSC articles

RSS Subscribe to the RSS feed of latest TDSC content added to the digital library.

Mail Sign up for the Transactions Connection newsletter.


Swimming with Sharks: Security Roundtable