By Topic

IEEE Transactions on Dependable and Secure Computing

Issue 1 • Date Jan.-March 2004

Filter Results

Displaying Results 1 - 12 of 12
  • [Front cover]

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2004, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • Welcome Message

    Publication Year: 2004, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (61 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introduction to the IEEE Transactions on Dependable and Secure Computing

    Publication Year: 2004, Page(s):2 - 3
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (42 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introduction of new Associate Editors

    Publication Year: 2004, Page(s):4 - 10
    Request permission for commercial reuse | PDF file iconPDF (378 KB)
    Freely Available from IEEE
  • Basic concepts and taxonomy of dependable and secure computing

    Publication Year: 2004, Page(s):11 - 33
    Cited by:  Papers (1384)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2520 KB) | HTML iconHTML

    This paper gives the main definitions relating to dependability, a generic concept including a special case of such attributes as reliability, availability, safety, integrity, maintainability, etc. Security brings in concerns for confidentiality, in addition to availability and integrity. Basic definitions are given first. They are then commented upon, and supplemented by additional definitions, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CODEX: a robust and secure secret distribution system

    Publication Year: 2004, Page(s):34 - 47
    Cited by:  Papers (24)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (944 KB) | HTML iconHTML

    CODEX (COrnell Data Exchange) stores secrets for subsequent access by authorized clients. It also is a vehicle for exploring the generality of a relatively new approach to building distributed services that are both fault-tolerant and attack-tolerant. Elements of that approach include: embracing the asynchronous (rather than synchronous) model of computation, use of Byzantine quorum systems for st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-based evaluation: from dependability to security

    Publication Year: 2004, Page(s):48 - 65
    Cited by:  Papers (162)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    The development of techniques for quantitative, model-based evaluation of computer system dependability has a long and rich history. A wide array of model-based evaluation techniques is now available, ranging from combinatorial methods, which are useful for quick, rough-cut analyses, to state-based methods, such as Markov reward models, and detailed, discrete-event simulation. The use of quantitat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A systems-theoretic approach to safety in software-intensive systems

    Publication Year: 2004, Page(s):66 - 86
    Cited by:  Papers (25)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2056 KB) | HTML iconHTML

    Traditional accident models were devised to explain losses caused by failures of physical devices in relatively simple systems. They are less useful for explaining accidents in software-intensive systems and for nontechnical aspects of safety such as organizational culture and human decision-making. This paper describes how systems theory can be used to form new accident models that better explain... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Commercial fault tolerance: a tale of two systems

    Publication Year: 2004, Page(s):87 - 96
    Cited by:  Papers (46)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB) | HTML iconHTML

    This paper compares and contrasts the design philosophies and implementations of two computer system families: the IBM S/360 and its evolution to the current zSeries line, and the Tandem (now HP) NonStop® Server. Both systems have a long history; the initial IBM S/360 machines were shipped in 1964, and the Tandem NonStop System was first shipped in 1976. They were aimed at similar markets, wha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TDSC Information for authors

    Publication Year: 2004, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2004, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University