By Topic

Dependable and Secure Computing, IEEE Transactions on

Issue 1 • Date Jan.-March 2005

Filter Results

Displaying Results 1 - 14 of 14
  • [Front cover]

    Publication Year: 2005 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (142 KB)  
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2005 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (73 KB)  
    Freely Available from IEEE
  • Editorial: State of the Journal Address

    Publication Year: 2005 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (38 KB)  
    Freely Available from IEEE
  • Database security - concepts, approaches, and challenges

    Publication Year: 2005 , Page(s): 2 - 19
    Cited by:  Papers (49)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (226 KB) |  | HTML iconHTML  

    As organizations increase their reliance on, possibly distributed, information systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Though a number of techniques, such as encryption and electronic signatures, are currently available to protect data when transmitted across sites, a truly comprehensive approach for dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unification of transactions and replication in three-tier architectures based on CORBA

    Publication Year: 2005 , Page(s): 20 - 33
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (702 KB) |  | HTML iconHTML  

    In this paper, we describe a software infrastructure that unifies transactions and replication in three-tier architectures and provides data consistency and high availability for enterprise applications. The infrastructure uses transactions based on the CORBA object transaction service to protect the application data in databases on stable storage, using a roll-backward recovery strategy, and repl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fingerprinting relational databases: schemes and specialties

    Publication Year: 2005 , Page(s): 34 - 45
    Cited by:  Papers (17)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (720 KB) |  | HTML iconHTML  

    In this paper, we present a technique for fingerprinting relational data by extending Agrawal et al.'s watermarking scheme. The primary new capability provided by our scheme is that, under reasonable assumptions, it can embed and detect arbitrary bit-string marks in relations. This capability, which is not provided by prior techniques, permits our scheme to be used as a fingerprinting scheme. We t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simple and efficient oracle-based consensus protocols for asynchronous Byzantine systems

    Publication Year: 2005 , Page(s): 46 - 56
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (520 KB) |  | HTML iconHTML  

    This paper is on the consensus problem in asynchronous distributed systems where (up to f) processes (among n) can exhibit a Byzantine behavior, i.e., can deviate arbitrarily from their specification. One way to solve the consensus problem in such a context consists of enriching the system with additional oracles that are powerful enough to cope with the uncertainty and unpredictability created by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault tolerance design in JPEG 2000 image compression system

    Publication Year: 2005 , Page(s): 57 - 75
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2246 KB) |  | HTML iconHTML  

    The JPEG 2000 image compression standard is designed for a broad range of data compression applications. The new standard is based on wavelet technology and layered coding in order to provide a rich feature compressed image stream. The implementations of the JPEG 2000 codec are susceptible to computer-induced soft errors. One situation requiring fault tolerance is remote-sensing satellites, where ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2004 Reviewers list

    Publication Year: 2005 , Page(s): 76 - 77
    Save to Project icon | Request Permissions | PDF file iconPDF (60 KB)  
    Freely Available from IEEE
  • Not a Member yet? Join the IEEE Computer Society

    Publication Year: 2005 , Page(s): 78
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | PDF file iconPDF (71 KB)  
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2005 , Page(s): 79
    Save to Project icon | Request Permissions | PDF file iconPDF (30 KB)  
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2005 , Page(s): 80
    Save to Project icon | Request Permissions | PDF file iconPDF (50 KB)  
    Freely Available from IEEE
  • TDSC Information for authors

    Publication Year: 2005 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (73 KB)  
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2005 , Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (142 KB)  
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University