Journal Information
IEEE Transactions on Dependable and Secure Computing (TDSC)
Impact Factor:

Call For Papers
Scope of TDSC

IEEE Transactions on Dependable and Secure Computing (TDSC) publishes archival research results focusing on research into foundations, methodologies, and mechanisms that support the achievement–through design, modeling, and evaluation–of systems and networks that are dependable and secure to the desired degree without compromising performance. The focus also includes measurement, modeling, and simulation techniques, and foundations for jointly evaluating, verifying, and designing for performance, security, and dependability constraints.

Topics include, but are not limited to, the following: View TDSC topics.

I. Design for Dependability and Security

Fault-tolerant, secure, and safe middleware
Intrusion detection and tolerance
Firewall technologies; authentication and authorization of users, systems, and applications
Network technologies, including protocols, routers, and switches
On-line detection and recovery
System Management and Administration
Application of cryptography techniques
Key management
Cryptographic protocols and algorithms, and their security
Use of COTS components

II. Evaluation

Modeling and Prediction
Threat-assessment and intrusion-detection models
Availability, performability, and survivability
Intrusion tolerance; attack models
Modeling methods, including Markov chains, queuing/fluid flow, Stochastic Petri Nets (SPN), SAN models
Experimental Methods
Monitoring and measurement
Workload characterization
Test-bed design, including fault, error, attack, and workload generation
Field monitoring and measurement, including failures, security violations and break-ins, and intrusion detection
Statistical methods
Formal Specification and Verification
Quality of Service (encompassing performability, security, and safety)

III. Application-Specific Areas

Survivable Database Design and Transaction Processing
Electronic Commerce
Embedded Systems
File and File System Security
Distributed and Pervasive Systems
Smartcards and Biometrics
Real-Time Systems
Safety-Critical Systems (e.g., aerospace computing)
Internet Applications
Multimedia Applications and Signal-Processing

IV. Software Design

Operating System Support (for error/intrusion detection and/or tolerance)
Self-Checking Software Systems
Dependable, Secure Protocols and Network Interfaces
Software Testing, Validation, and Verification
Software Aging and Rejuvenation
Software Security and Reliability Engineering
V. New Technologies (problems and opportunities)

Nanoscale Computing
Ad Hoc Networks
Pervasive and Embedded Computing
Networks of Satellites
Data Mining
Wearable Computers and Associated Networks
Quantum Computing
Cyber-Physical Systems (e.g., mobile health, Smart Grid, and ITS)

Additional Information

As noted in the Jan-Mar. 2009 editorial, please note the following additional clarification of our scope: "Our Editorial Board decided that papers of purely theoretical interest in the area of cryptography without a clear and manifest application to a specific problem of dependability or security would fall out of the purview of these Transactions; similarly, papers addressing generic systems-management problems, as opposed to specific dependability and security challenges, as well those solving device-level, as opposed to system-level, dependability and security concerns, would also be out of our publication's scope."

TDSC welcomes proposals for topic-oriented special issues. Guidelines are provided here.

In addition to policies specified at Instructions for Peer Review, TDSC specifically has the following policies: (1) Papers which require a major revision will not receive a second major revision recommendation. In such situations the paper will be rejected. Authors should not assume that a major revision will lead to eventual acceptance. (2) The scope of topics was clarified in the editorial of the Jan-Mar 2009 issue as follows. "Our Editorial Board decided that papers of purely theoretical interest in the area of cryptography without a clear and manifest application to a specific problem of dependability or security would fall out of the purview of these Transactions; similarly, papers addressing generic systems-management problems, as opposed to specific dependability and security challenges, as well those solving device-level, as opposed to system-level, dependability and security concerns, would also be out of our publication's scope." (3) TDSC requires meaningful technical novelty in submissions that extend previously published conference papers. Extension beyond the conference version(s) is not simply a matter of length. Thus, expanded motivation, expanded discussion of related work, variants of previously reported algorithms, incremental additional experiments/simulations, proofs of results/theorems, may provide additional length but will fall below the line for proceeding with review.
Last updated by Xin Yao in 2016-07-11
Special Issues
Special Issue on Special Issue on Paradigm Shifts in Cryptographic Engineering
Submission Date: 2017-01-31

Research on cryptologic approaches to solving real-world security problems has been conducted in the public domain for decades, and well established paradigms and techniques now exist that can solve numerous security problems in our lives. Since then, substantial breakthroughs have been made in cryptographic engineering especially in the recent years. To be more precise, by cryptographic engineering, we mean the security techniques researched with cryptographic rigour aimed at solving real-life problems in our current world; these involve systems, components, practical methods and algorithms, implementations as well as human elements. Indeed, our society is constantly influenced by different lifestyle shifts driven by diverse technological advances: to name a few recent technological revolutions beyond the more established trends of cloud computing and big data; notably internet of things (IoT), cyber-physical systems (CPS), cyber-physical social lifestyles augmented by social media, smart clothing, and more recently nanosensors and flexible electronics. Meanwhile, the security research community has now matured to a level where cryptographic engineering techniques with additional features beyond the basic security requirements are increasingly being proposed, due largely to real-world constraints, changing needs or socio-technological revolutions. Recent ones include fully homomorphic cryptography, functional cryptography and *-preserving cryptography, where we use * as a wildcard to denote different features that can be preserved, e.g. format, order, structure, privacy, property. In response to recent news of security systems being subverted, attention has also been devoted to the notions of malicious security and adversarial security, i.e. where security is no longer just against bad guys but where good guys who are conventionally viewed as mostly defensive can equally be adversarial. Meanwhile, the way that humans interact with each other has drastically changed since the days when cryptographic engineering research first commenced that modelled the security problems essentially as multi-party communications. From conventional terminal-based communications, our world now is one where people interact on the go, with others virtually in social media, aided by a myriad of personal networked gadgets and smart things. Therefore, it is time to revisit the existing cryptographic engineering paradigms and underlying assumptions on which current techniques are built. This special issue will solicit original papers of substantial technical contribution with particular focus on paradigm-shifting cryptographic engineering research & thinking outside the current box. These will include the following indicative topic categories: •paradigm-shifting, unconventional cryptographic engineering techniques and/or frameworks, influenced by recent and/or future socio-technological revolutions including cyber-physical systems (CPS), Internet of Everything (IoE), nano-sensors, flexible electronics; in addition to the cloud and big data (e.g. malicious security, adversarial security, unconventional formulations of underlying problems, or new hard problems to suit such revolutions) •position papers on breakthrough cryptographic engineering research •revisits/critiques/analysis of long-standing cryptographic engineering paradigms / approaches / models /formulations (in fact, we also encourage paired submissions by security factions of opposing views, where each paper inthe pair argues for/against a well-established paradigm) •approaches/solutions to long-standing open problems; or formulations of long-standing/thus-far adhocsecurity approaches •new paradigms for cryptofications of the real world(e.g. new types of adversarial models and/or formal security notions inspired by real world incidents/problems, such as accountability, dependability, provenance, verifiability, chain-of-custody, admissibility, compromisability; formally modelling humans-in-the-security-loop) •cryptographic engineering & beyond: cryptologic techniques in union with techniques from other disciplines The gist is that we welcome all things non-conventional, paradigm-shifting & out of the box. Instructions for Authors The submissions must be anonymous with no obvious references. Submissions must be at most 14 pages (double column IEEE format); and be in 10pt fonts using the IEEE Trans format with the specified margins. The main part of the paper should be intelligible as reviewers are not required to read the appendices. The introduction should summarize the main contributions of the paper so that it is understandable to a non-expert in cryptography. Submissions must not substantially duplicate work that any of the authors has published in a journal or aconference/workshop with proceedings, or has submitted/is planning to submit before the author notification deadline to a journal or other conferences/workshops that have proceedings. Accepted submissions may not appear in any other conference or workshop that has proceedings. The Guest Editors reserve the right to share information about submissions with other program committees or editors to detect parallel submissions and the IEEE policy on irregular submissions will be strictly enforced. Submissions not meeting these guidelines will be rejected without consideration of their merits. Submitted papers must be in PDF format and should be submitted electronically via the submission server . The reviewing process will involve two stages. Some papers will be rejected after stage 1, others will proceed to stage 2 and rebuttals will be requested from these authors. The rebuttals will be taken into consideration during the stage 2 of the reviewers discussion. In fact, the submission system will open by July 1, 2016, with the final deadline being Jan 31, 2017. Papers submitted early are likely to be processed even before the deadline, and early acceptance/rejection notifications for such papers will be sent out as soon as review reports are received. Authors of early accepted papers have the option to present their papers at the paradigm-shifting crypto conference Mycrypt 2016, especially for paired submissions, revisits of long-standing problems or controversial pieces. Important dates Submission opens July 1, 2016 Potential selection for Elsewhere presentation August 1~October 1, 2016 Submission deadline January 31, 2017 (23:59 UTC) First round of comments March 31, 2017 Rebuttals due April 1, 2017 Notification of acceptance May 1, 2017 Camera ready version due June 1, 2017 Publication date Q4, 2017 Guest Editors 1. Professor Raphael C.-W. Phan Multimedia University (MMU), Malaysia 2. Professor Moti Yung Google & Columbia University, USA
Last updated by Xuan Liu in 2016-03-01
Related Publications
Related Conferences