Editorial Board
Publisher's note
Special Issue: Dependable and Secure Computing
Message matching-based greedy behavior detection in delay tolerant networks
Trust enhanced distributed authorisation for web services
Self-adaptive federated authorization infrastructures
Software control flow error detection and correlation with system performance deviation
A survey of emerging threats in cybersecurity
A security framework in G-Hadoop for big data computing across distributed Cloud data centres
A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud
Internet traffic clustering with side information
Contents