{"id":"https://openalex.org/W4231590803","doi":"https://doi.org/10.1109/tdsc.2017.2779333","title":"Editorial","display_name":"Editorial","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W4231590803","doi":"https://doi.org/10.1109/tdsc.2017.2779333"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2017.2779333","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2017.2779333","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"editorial","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034878799","display_name":"Jaideep Vaidya","orcid":"https://orcid.org/0000-0002-7420-6947"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jaideep Vaidya","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5034878799"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.1689,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.65398977,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"15","issue":"1","first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.09300000220537186,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.09300000220537186,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.05220000073313713,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.03629999980330467,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dependability","display_name":"Dependability","score":0.8143308162689209},{"id":"https://openalex.org/keywords/excellence","display_name":"Excellence","score":0.6403053402900696},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5240362286567688},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.5125810503959656},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.45278191566467285},{"id":"https://openalex.org/keywords/plan","display_name":"Plan (archaeology)","score":0.4174957573413849},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37784844636917114},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.20198935270309448},{"id":"https://openalex.org/keywords/history","display_name":"History","score":0.19453123211860657},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.18974006175994873},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.176008939743042},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.07902446389198303}],"concepts":[{"id":"https://openalex.org/C77019957","wikidata":"https://www.wikidata.org/wiki/Q2689057","display_name":"Dependability","level":2,"score":0.8143308162689209},{"id":"https://openalex.org/C2777352838","wikidata":"https://www.wikidata.org/wiki/Q5419420","display_name":"Excellence","level":2,"score":0.6403053402900696},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5240362286567688},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.5125810503959656},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.45278191566467285},{"id":"https://openalex.org/C2776505523","wikidata":"https://www.wikidata.org/wiki/Q4785468","display_name":"Plan (archaeology)","level":2,"score":0.4174957573413849},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37784844636917114},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.20198935270309448},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.19453123211860657},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.18974006175994873},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.176008939743042},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.07902446389198303},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2017.2779333","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2017.2779333","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2169628522","https://openalex.org/W4252527915","https://openalex.org/W2409287660","https://openalex.org/W2233357156","https://openalex.org/W1976489385","https://openalex.org/W4256317220","https://openalex.org/W1506225852","https://openalex.org/W2141414364","https://openalex.org/W2376514150","https://openalex.org/W1523265213"],"abstract_inverted_index":{"IEEE":[0,85,150,242,429],"TDSC":[1,42,86,117,151,243],"has":[2,43,87,188,239],"a":[3,47,190,245,362,396,462],"long":[4,381],"history":[5,384],"of":[6,18,30,52,59,81,97,106,125,139,148,163,185,193,211,219,295,329,385,398,422,444,464],"13":[7],"years":[8],"since":[9],"it":[10,317],"was":[11,152],"started":[12],"in":[13,56,91,122,216,241,411,417],"2004.":[14],"Under":[15],"the":[16,28,57,74,79,93,109,119,123,144,155,161,208,217,230,235,255,263,284,290,304,310,322,327,336,374,380,386,408,412,420,428,442,459,468],"leadership":[17,29,80],"its":[19,69,280,473],"founding":[20],"Editor-in-Chief":[21],"(EIC)":[22],"Ravishankar":[23],"Iyer":[24],"and":[25,39,61,95,127,146,165,169,187,198,222,250,265,282,293,315,341,343,358,382,388,400,406,433,435,470],"later":[26],"under":[27,78],"three":[31],"very":[32,89,363],"distinguished":[33,383],"EICs":[34,237],"Virgil":[35],"Gligor,":[36],"Ravi":[37],"Sandhu,":[38],"Elisa":[40,83,313],"Bertino,":[41,84,314],"established":[44,308],"itself":[45],"as":[46,207,461],"premier":[48,246],"venue":[49,247],"for":[50,213,248,366,373],"publication":[51],"high":[53,70],"quality":[54,96],"articles":[55],"area":[58,124],"dependable":[60],"secure":[62],"systems.":[63],"This":[64,100,360,414],"is":[65,101,131,183,202,361,415],"ably":[66],"demonstrated":[67],"by":[68,234,309,326,356,377,427,440],"impact":[71,104,145,349],"factor.":[72],"During":[73],"last":[75],"four":[76],"years,":[77],"Professor":[82],"been":[88],"successful":[90],"increasing":[92,143,291],"number":[94],"published":[98],"papers.":[99],"reflected":[102],"an":[103,448],"factor":[105],"2.926":[107],"(per":[108],"most":[110],"recent":[111],"Journal":[112],"Citation":[113],"Report),":[114],"which":[115,238],"places":[116],"among":[118,267],"top":[120],"journals":[121],"dependability":[126,251,389,401],"security.":[128],"My":[129,200],"plan":[130,300,333,393],"to":[132,134,203,227,261,274,297,301,318,334,353,394,403,419,458,467],"continue":[133,260],"work":[135,215,232,410],"on":[136,306,338,431],"this":[137,438,445],"path":[138],"excellence":[140],"towards":[141],"further":[142,275,302,436,454,471],"visibility":[147],"TDSC.":[149,378],"founded":[153],"with":[154,347],"overarching":[156],"vision":[157,201],"that":[158,350],"even":[159],"though":[160],"fields":[162,375],"Dependability":[164],"Security":[166,432],"have":[167,170,271,351],"originated":[168],"grown":[171],"separately,":[172],"there":[173],"are":[174],"many":[175],"synergies":[176,264],"between":[177],"these":[178,268],"two":[179],"disciplines.":[180],"Furthermore,":[181],"privacy":[182,296,307],"increasingly":[184],"interest":[186],"become":[189],"primary":[191],"focus":[192,305,337],"research":[194,252,345,368],"across":[195],"both":[196],"security":[197,249,387,399],"dependability.":[199],"consolidate":[204],"TDSC\u2019s":[205,277,456],"position":[206],"pre-eminent":[209],"journal":[210],"choice":[212],"archival":[214,449],"areas":[218],"dependability,":[220],"security,":[221],"privacy.":[223],"I":[224,258,270,299,331,391],"would":[225],"like":[226],"especially":[228,371],"acknowledge":[229],"tremendous":[231],"done":[233],"previous":[236,256],"resulted":[240],"becoming":[244],"publication.":[253],"Following":[254],"EICs,":[257],"will":[259,452],"foster":[262],"interdependencies":[266],"fields.":[269],"concrete":[272],"plans":[273],"broaden":[276,303],"scope,":[278],"increase":[279],"impact,":[281],"reduce":[283],"editorial":[285],"turnaround":[286],"time.":[287],"Specifically,":[288],"given":[289],"importance":[292],"centrality":[294],"computing,":[298],"current":[311],"EiC":[312],"expand":[316,335],"take":[319],"into":[320],"account":[321],"unique":[323],"challenges":[324],"posed":[325],"internet":[328],"things.":[330],"also":[332,392,453],"technology":[339],"policy":[340],"standardization":[342],"encourage":[344],"papers":[346],"practical":[348],"potential":[352],"be":[354],"adopted":[355],"industry":[357],"government.":[359],"important":[364],"aspect":[365],"any":[367],"field,":[369],"but":[370],"so":[372],"covered":[376],"Given":[379],"fields,":[390],"create":[395],"science":[397],"track":[402,425],"consolidate,":[404],"contextualize,":[405],"categorize":[407],"existing":[409],"field.":[413],"similar":[416],"spirit":[418],"systematization":[421],"knowledge":[423,465],"(SoK)":[424],"pioneered":[426],"Symposium":[430],"Privacy":[434],"extends":[437],"effort":[439,446],"recognizing":[441],"value":[443,457],"from":[447],"perspective.":[450],"It":[451],"establish":[455],"community":[460],"repository":[463],"critical":[466],"field":[469],"enhance":[472],"impact.":[474]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2026-03-03T08:47:05.690250","created_date":"2022-05-12T00:00:00"}
