IEEE Transactions on Dependable and Secure Computing

Issue 4 • Oct.-Dec. 2005

Filter Results

Displaying Results 1 - 13 of 13
  • [Front cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2005, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • A family of trusted third party based fair-exchange protocols

    Publication Year: 2005, Page(s):273 - 286
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1192 KB) | HTML iconHTML

    Fair exchange protocols play an important role in application areas such as e-commerce where protocol participants require mutual guarantees that a transaction involving exchange of items has taken place in a specific manner. A protocol is fair if no protocol participant can gain any advantage over an honest participant by misbehaving. In addition, such a protocol is fault-tolerant if the protocol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient index-based checkpointing protocol with constant-size control information on messages

    Publication Year: 2005, Page(s):287 - 296
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    Communication-induced checkpointing (CIC) protocols can be used to prevent the domino effect. Such protocols that belong to the index-based category were shown to have a better performance. In this paper, we propose an efficient index-based CIC protocol. The fully informed (FI) protocol proposed in the literature has been known to be the best index-based CIC protocol that one can achieve since the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomic microprocessor execution via self-repairing arrays

    Publication Year: 2005, Page(s):297 - 310
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1184 KB) | HTML iconHTML

    To achieve high reliability despite hard faults that occur during operation and to achieve high yield despite defects introduced at fabrication, a microprocessor must be able to tolerate hard faults. In this paper, we present a framework for autonomic self-repair of the array structures in microprocessors (e.g., reorder buffer, instruction window, etc.). The framework consists of three aspects: 1)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for ad hoc networks

    Publication Year: 2005, Page(s):311 - 323
    Cited by:  Papers (37)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB) | HTML iconHTML

    Securing ad hoc networks is notoriously challenging, notably due to the lack of an online infrastructure. In particular, key management is a problem that has been addressed by many researchers but with limited results. In this paper, we consider the case where an ad hoc network is under the responsibility of a mother certification authority (mCA). Since the nodes can frequently be collectively iso... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring the macroscopic effect of DDoS flooding attacks

    Publication Year: 2005, Page(s):324 - 335
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1464 KB) | HTML iconHTML

    Creating defenses against flooding-based, distributed denial-of-service (DDoS) attacks requires real-time monitoring of network-wide traffic to obtain timely and significant information. Unfortunately, continuously monitoring network-wide traffic for suspicious activities presents difficult challenges because attacks may arise anywhere at any time and because attackers constantly modify attack dyn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OBDD-based evaluation of reliability and importance measures for multistate systems subject to imperfect fault coverage

    Publication Year: 2005, Page(s):336 - 347
    Cited by:  Papers (37)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1208 KB) | HTML iconHTML

    Algorithms for evaluating the reliability of a complex system such as a multistate fault-tolerant computer system have become more important. They are designed to obtain the complete results quickly and accurately even when there exist a number of dependencies such as shared loads (reconfiguration), degradation, and common-cause failures. This paper presents an efficient method based on ordered bi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The effect of the specification model on the complexity of adding masking fault tolerance

    Publication Year: 2005, Page(s):348 - 355
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    In this paper, we investigate the effect of the representation of safety specification on the complexity of adding masking fault tolerance to programs - where, in the presence of faults, the program 1) recovers to states from where it satisfies its (safety and liveness) specification and 2) preserves its safety specification during recovery. Specifically, we concentrate on two approaches for model... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Annual Index

    Publication Year: 2005, Page(s):356 - 359
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2005, Page(s): 360
    Request permission for commercial reuse | PDF file iconPDF (615 KB)
    Freely Available from IEEE
  • TDSC Information for authors

    Publication Year: 2005, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2005, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University