IEEE Transactions on Dependable and Secure Computing

Issue 2 • April-June 2005

Filter Results

Displaying Results 1 - 13 of 13
  • [Front cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2005, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Guest Editor's Introduction: 2005 IEEE Symposium on Security and Privacy

    Publication Year: 2005, Page(s): 81
    Request permission for commercial reuse | PDF file iconPDF (65 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardware-assisted circumvention of self-hashing software tamper resistance

    Publication Year: 2005, Page(s):82 - 92
    Cited by:  Papers (21)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB) | HTML iconHTML

    Self-hashing has been proposed as a technique for verifying software integrity. Appealing aspects of this approach to software tamper resistance include the promise of being able to verify the integrity of software independent of the external support environment, as well as the ability to integrate code protection mechanisms automatically. In this paper, we show that the rich functionality of most... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote physical device fingerprinting

    Publication Year: 2005, Page(s):93 - 108
    Cited by:  Papers (88)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1048 KB) | HTML iconHTML

    We introduce the area of remote physical device fingerprinting, or fingerprinting a physical device, as opposed to an operating system or class of devices, remotely, and without the fingerprinted device's known cooperation. We accomplish this goal by exploiting small, microscopic deviations in device hardware: clock skews. Our techniques do not require any modification to the fingerprinted devices... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Relating symbolic and cryptographic secrecy

    Publication Year: 2005, Page(s):109 - 123
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB) | HTML iconHTML

    We investigate the relation between symbolic and cryptographic secrecy properties for cryptographic protocols. Symbolic secrecy of payload messages or exchanged keys is arguably the most important notion of secrecy shown with automated proof tools. It means that an adversary restricted to symbolic operations on terms can never get the entire considered object into its knowledge set. Cryptographic ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comprehensive model for software rejuvenation

    Publication Year: 2005, Page(s):124 - 137
    Cited by:  Papers (114)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1208 KB) | HTML iconHTML

    Recently, the phenomenon of software aging, one in which the state of the software system degrades with time, has been reported. This phenomenon, which may eventually lead to system performance degradation and/or crash/hang failure, is the result of exhaustion of operating system resources, data corruption, and numerical error accumulation. To counteract software aging, a technique called software... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SPEK: a storage performance evaluation kernel module for block-level storage systems under faulty conditions

    Publication Year: 2005, Page(s):138 - 149
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (888 KB) | HTML iconHTML

    This paper introduces a new benchmark tool, SPEK (storage performance evaluation kernel module), for evaluating the performance of block-level storage systems in the presence of faults as well as under normal operations. SPEK can work on both direct attached storage (DAS) and block level networked storage systems such as storage area networks (SAN). Each SPEK consists of a controller, several work... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A low-cost concurrent BIST scheme for increased dependability

    Publication Year: 2005, Page(s):150 - 156
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB) | HTML iconHTML

    Built-in self-test (BIST) techniques constitute an attractive and practical solution to the difficult problem of testing VLSI circuits and systems. Input vector monitoring concurrent BIST schemes can circumvent problems appearing separately in online and in offline BIST schemes. An important measure of the quality of an input vector monitoring concurrent BIST scheme is the time required to complet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analysis of expressiveness and design issues for the generalized temporal role-based access control model

    Publication Year: 2005, Page(s):157 - 175
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2664 KB) | HTML iconHTML

    The generalized temporal role-based access control (GTRBAC) model provides a comprehensive set of temporal constraint expressions which can facilitate the specification of fine-grained time-based access control policies. However, the issue of the expressiveness and usability of this model has not been previously investigated. In this paper, we present an analysis of the expressiveness of the const... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Advertisement]

    Publication Year: 2005, Page(s): 176
    Request permission for commercial reuse | PDF file iconPDF (721 KB)
    Freely Available from IEEE
  • TDSC Information for authors

    Publication Year: 2005, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2005, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University