Topics within the scope of IEEE Transactions on Dependable and Secure Computing

Topics include, but are not limited to, the following:

 

I. Design for Dependability and Security

  • Architectures
    • Fault-tolerant, secure, and safe middleware
    • Intrusion detection and tolerance
    • Firewall technologies; authentication and authorization of users, systems, and applications
    • Network technologies, including protocols, routers, and switches
    • On-line detection and recovery
  • System Management and Administration
  • Cryptography
    • Application of cryptography techniques
    • Key management
    • Cryptographic protocols and algorithms, and their security
  • Use of COTS components

II. Evaluation

  • Modeling and Prediction
    • Threat-assessment and intrusion-detection models
    • Availability, performability, and survivability
    • Intrusion tolerance; attack models
    • Modeling methods, including Markov chains, queuing/fluid flow, Stochastic Petri Nets (SPN), SAN models
  • Experimental Methods
    • Monitoring and measurement
    • Workload characterization
    • Benchmarking
    • Test-bed design, including fault, error, attack, and workload generation
    • Field monitoring and measurement, including failures, security violations and break-ins, and intrusion detection
    • Statistical methods
  • Formal Specification and Verification
  • Quality of Service (encompassing performability, security, and safety)

III. Application-Specific Areas

  • Survivable Database Design and Transaction Processing
  • Electronic Commerce
  • Embedded Systems
  • File and File System Security
  • Distributed and Pervasive Systems
  • Smartcards and Biometrics
  • Real-Time Systems
  • Safety-Critical Systems (e.g., aerospace computing)
  • Internet Applications
  • Multimedia Applications and Signal-Processing

IV. Software Design

  • Operating System Support (for error/intrusion detection and/or tolerance)
  • Self-Checking Software Systems
  • Dependable, Secure Protocols and Network Interfaces
  • Software Testing, Validation, and Verification
  • Software Aging and Rejuvenation
  • Software Security and Reliability Engineering

V. New Technologies (problems and opportunities)

  • Nanoscale Computing
  • Ad Hoc Networks
  • Pervasive and Embedded Computing
  • Networks of Satellites
  • Data Mining
  • Wearable Computers and Associated Networks
  • Quantum Computing
  • Cyber-Physical Systems (e.g., mobile health, Smart Grid, and ITS)