仕訳帳情報
IEEE Transactions on Dependable and Secure Computing (TDSC)
http://www.computer.org/portal/web/tdsc
インパクト ・ ファクター:
1.592
出版社:
IEEE
ISSN:
1545-5971
閲覧:
10261
追跡:
21

広告
論文募集
Scope of TDSC

IEEE Transactions on Dependable and Secure Computing (TDSC) publishes archival research results focusing on research into foundations, methodologies, and mechanisms that support the achievement–through design, modeling, and evaluation–of systems and networks that are dependable and secure to the desired degree without compromising performance. The focus also includes measurement, modeling, and simulation techniques, and foundations for jointly evaluating, verifying, and designing for performance, security, and dependability constraints.

Topics include, but are not limited to, the following: View TDSC topics.

I. Design for Dependability and Security

Architectures
Fault-tolerant, secure, and safe middleware
Intrusion detection and tolerance
Firewall technologies; authentication and authorization of users, systems, and applications
Network technologies, including protocols, routers, and switches
On-line detection and recovery
System Management and Administration
Cryptography
Application of cryptography techniques
Key management
Cryptographic protocols and algorithms, and their security
Use of COTS components

II. Evaluation

Modeling and Prediction
Threat-assessment and intrusion-detection models
Availability, performability, and survivability
Intrusion tolerance; attack models
Modeling methods, including Markov chains, queuing/fluid flow, Stochastic Petri Nets (SPN), SAN models
Experimental Methods
Monitoring and measurement
Workload characterization
Benchmarking
Test-bed design, including fault, error, attack, and workload generation
Field monitoring and measurement, including failures, security violations and break-ins, and intrusion detection
Statistical methods
Formal Specification and Verification
Quality of Service (encompassing performability, security, and safety)

III. Application-Specific Areas

Survivable Database Design and Transaction Processing
Electronic Commerce
Embedded Systems
File and File System Security
Distributed and Pervasive Systems
Smartcards and Biometrics
Real-Time Systems
Safety-Critical Systems (e.g., aerospace computing)
Internet Applications
Multimedia Applications and Signal-Processing

IV. Software Design

Operating System Support (for error/intrusion detection and/or tolerance)
Self-Checking Software Systems
Dependable, Secure Protocols and Network Interfaces
Software Testing, Validation, and Verification
Software Aging and Rejuvenation
Software Security and Reliability Engineering
V. New Technologies (problems and opportunities)

Nanoscale Computing
Ad Hoc Networks
Pervasive and Embedded Computing
Networks of Satellites
Data Mining
Wearable Computers and Associated Networks
Quantum Computing
Cyber-Physical Systems (e.g., mobile health, Smart Grid, and ITS)

Additional Information

As noted in the Jan-Mar. 2009 editorial, please note the following additional clarification of our scope: "Our Editorial Board decided that papers of purely theoretical interest in the area of cryptography without a clear and manifest application to a specific problem of dependability or security would fall out of the purview of these Transactions; similarly, papers addressing generic systems-management problems, as opposed to specific dependability and security challenges, as well those solving device-level, as opposed to system-level, dependability and security concerns, would also be out of our publication's scope."

TDSC welcomes proposals for topic-oriented special issues. Guidelines are provided here.

In addition to policies specified at Instructions for Peer Review, TDSC specifically has the following policies: (1) Papers which require a major revision will not receive a second major revision recommendation. In such situations the paper will be rejected. Authors should not assume that a major revision will lead to eventual acceptance. (2) The scope of topics was clarified in the editorial of the Jan-Mar 2009 issue as follows. "Our Editorial Board decided that papers of purely theoretical interest in the area of cryptography without a clear and manifest application to a specific problem of dependability or security would fall out of the purview of these Transactions; similarly, papers addressing generic systems-management problems, as opposed to specific dependability and security challenges, as well those solving device-level, as opposed to system-level, dependability and security concerns, would also be out of our publication's scope." (3) TDSC requires meaningful technical novelty in submissions that extend previously published conference papers. Extension beyond the conference version(s) is not simply a matter of length. Thus, expanded motivation, expanded discussion of related work, variants of previously reported algorithms, incremental additional experiments/simulations, proofs of results/theorems, may provide additional length but will fall below the line for proceeding with review.
最終更新 Dou Sun 2017-07-01
Special Issues
Special Issue on Security in Emerging Networking Technologies
提出日: 2017-09-30

Network infrastructure is undergoing a major shift away from ossified hardware-based networks to programmable software-based networks. One compelling example of this paradigm shift is the advent of Software-Defined Networking (SDN). A traditional network mixes control and traffic processing logic in single hardware devices, making the network more complex and harder to manage. SDN has addressed this issue by decoupling the control plane in network devices from the data plane to simplify production networks. On the other hand, enterprise networks are populated with a large number of proprietary and expensive hardware-based middleboxes, such as firewall, IDS/IPS, and load balancing. Hardware-based middleboxes present significant drawbacks such as high costs, management complexity, slow time to market, and unscalability. Network Function Virtualization (NFV) was proposed as another new network paradigm to address those drawbacks by replacing hardware-based network functions with virtualized software systems running on generic and inexpensive commodity hardware. Given their benefits, SDN and NFV have recently attracted significant attention from both academia and industry. SDN and NFV introduce significant granularity, visibility, flexibility, and elasticity to networking, but at the same time bring forth new security challenges. For example, decoupling the data plane and the control plane in SDN essentially opens a door to attackers for exploiting the vulnerabilities of SDN controllers, APIs, applications, and protocols, and further break their trust relations. Meanwhile, both SDN and NFV could be leveraged to strengthen network defense. The aim of this special issue is to encompass research advances in all areas of security in emerging networking technologies. The special issue intends to provide a venue for interested researchers and practitioners to share their novel research ideas and results. This special issue calls for original, high-quality, high-impact research papers related to the following broad topics, but are not limited to: - SDN/NFV-enabled security architecture - SDN/NFV-based automated network security - SDN/NFV-based mitigation for attacks - SDN/NFV-based network forensics and auditing - Authentication/confidentiality in SDN/NFV-based networks - Proofs of security in SDN/NFV-based networks - Logic flaws in SDN/NFV implementations - Attacks/defense to SDN controllers, protocols, and APIs - SDN/NFV-oriented security policy enforcement - Trust management of SDN applications and controllers - Development and deployment of NFV-based security functions (virtual firewalls, virtual IDSs, virtual DDoS mitigation, etc.) - SDN/NFV-enabled security for Internet of Things - Safe state migration in NFV - Network security as a service - Privacy-preserving solutions for SDN/NFV - Security of programmable components
最終更新 Dou Sun 2017-07-01
広告
関連仕訳帳
CCF完全な名前インパクト ・ ファクター出版社ISSN
International Journal of Web & Semantic Technology AIRCC0976-2280
Queueing Systems0.438Springer0257-0130
ACM Transactions on Spatial Algorithms and SystemsACM2374-0353
Telematics and Informatics2.261ELSEVIER0736-5853
IEEE Computer1.115IEEE0018-9162
Journal of Internet Services and Applications Springer1869-0238
aIEEE Transactions on Mobile Computing IEEE1536-1233
Journal on Computing and Cultural HeritageACM1556-4673
cNatural Computing Springer1567-7818
bParallel Computing1ELSEVIER0167-8191
関連会議
おすすめ