By Topic

IEEE Transactions on Dependable and Secure Computing

Issue 3 • Date July-Sept. 2005

Filter Results

Displaying Results 1 - 12 of 12
  • [Front cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2005, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Fault-tolerant cluster-wise clock synchronization for wireless sensor networks

    Publication Year: 2005, Page(s):177 - 189
    Cited by:  Papers (25)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB) | HTML iconHTML

    Wireless sensor networks have received a lot of attention recently due to their wide applications, such as target tracking, environment monitoring, and scientific exploration in dangerous environments. It is usually necessary to have a cluster of sensor nodes share a common view of a local clock time, so that all these nodes can coordinate in some important applications, such as time slotted MAC p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concurrent online testing of identical circuits using nonidentical input vectors

    Publication Year: 2005, Page(s):190 - 200
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1240 KB) | HTML iconHTML

    Current designs may contain several identical copies of the same circuit (or functional unit). Such circuits can be tested by comparing the output vectors they produce under identical input vectors. This alleviates the need to observe the output response, and facilitates online testing. We show that testing of identical circuits by output comparison can be done effectively even when the input vect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complexity issues in automated synthesis of failsafe fault-tolerance

    Publication Year: 2005, Page(s):201 - 215
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    We focus on the problem of synthesizing failsafe fault-tolerance where fault-tolerance is added to an existing (fault-intolerant) program. A failsafe fault-tolerant program satisfies its specification (including safety and liveness) in the absence of faults. However, in the presence of faults, it satisfies its safety specification. We present a somewhat unexpected result that, in general, the prob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • D-WARD: a source-end defense against flooding denial-of-service attacks

    Publication Year: 2005, Page(s):216 - 232
    Cited by:  Papers (65)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1216 KB) | HTML iconHTML

    Defenses against flooding distributed denial-of-service (DDoS) commonly respond to the attack by dropping the excess traffic, thus reducing the overload at the victim. The major challenge is the differentiation of the legitimate from the attack traffic, so that the dropping policies can be selectively applied. We propose D-WARD, a source-end DDoS defense system that achieves autonomous attack dete... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the distribution and revocation of cryptographic keys in sensor networks

    Publication Year: 2005, Page(s):233 - 247
    Cited by:  Papers (69)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    Key management has two important aspects: key distribution, which describes how to disseminate secret information to the principals so that secure communications can be initiated, and key revocation, which describes how to remove secrets that may have been compromised. Key management in sensor networks face constraints of large scale, lack of a priori information about deployment topology, and lim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure spread: an integrated architecture for secure group communication

    Publication Year: 2005, Page(s):248 - 261
    Cited by:  Papers (28)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1088 KB) | HTML iconHTML

    Group communication systems are high-availability distributed systems providing reliable and ordered message delivery, as well as a membership service, to group-oriented applications. Many such systems are built using a distributed client-server architecture where a relatively small set of servers provide service to numerous clients. In this work, we show how group communication systems can be enh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal redundancy allocation for information technology disaster recovery in the network economy

    Publication Year: 2005, Page(s):262 - 267
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    A discrete optimization model is proposed to allocate redundancy to critical IT functions for disaster recovery planning. The objective is to maximize the overall survivability of an organization's IT functions by selecting their appropriate redundancy levels. A solution procedure based on probabilistic dynamic programming is presented along with two examples. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for the revocation of unintended digital signatures initiated by malicious terminals

    Publication Year: 2005, Page(s):268 - 272
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    Human users need trusted computers when they want to generate digital signatures. In many applications, in particular, if the users are mobile, they need to carry their trusted computers with themselves. Smart cards are easy to use, easy to carry, and relatively difficult to tamper with, but they do not have a user interface; therefore, the user still needs a terminal for authorizing the card to p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TDSC Information for authors

    Publication Year: 2005, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2005, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University