By Topic

IEEE Transactions on Dependable and Secure Computing

Issue 2 • Date April-June 2006

Filter Results

Displaying Results 1 - 11 of 11
  • [Front cover]

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2006, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • A practical password-based two-server authentication and key exchange system

    Publication Year: 2006, Page(s):105 - 114
    Cited by:  Papers (19)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1205 KB) | HTML iconHTML

    Most password-based user authentication systems place total trust on the authentication server where cleartext passwords or easily derived password verification data are stored in a central database. Such systems are, thus, by no means resilient against offline dictionary attacks initiated at the server side. Compromise of the authentication server by either outsiders or insiders subjects all user... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated online monitoring of distributed applications through external monitors

    Publication Year: 2006, Page(s):115 - 129
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2049 KB) | HTML iconHTML

    It is a challenge to provide detection facilities for large-scale distributed systems running legacy code on hosts that may not allow fault tolerant functions to execute on them. It is tempting to structure the detection in an observer system that is kept separate from the observed system of protocol entities, with the former only having access to the latter's external message exchanges. In this p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distribution-free checkpoint placement algorithms based on min-max principle

    Publication Year: 2006, Page(s):130 - 140
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2606 KB) | HTML iconHTML

    In this paper, we consider two kinds of sequential checkpoint placement problems with infinite/finite time horizon. For these problems, we apply approximation methods based on the variational principle and develop computation algorithms to derive the optimal checkpoint sequence approximately. Next, we focus on the situation where the knowledge on system failure is incomplete, i.e., the system fail... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks

    Publication Year: 2006, Page(s):141 - 155
    Cited by:  Papers (38)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4001 KB) | HTML iconHTML

    Distributed denial-of-service (DDoS) attacks are a critical threat to the Internet. This paper introduces a DDoS defense scheme that supports automated online attack characterizations and accurate attack packet discarding based on statistical processing. The key idea is to prioritize a packet based on a score which estimates its legitimacy given the attribute values it carries. Once the score of a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Role-based access control for grid database services using the community authorization service

    Publication Year: 2006, Page(s):156 - 166
    Cited by:  Papers (15)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2088 KB) | HTML iconHTML

    In this paper, we propose a role-based access control (RBAC) method for grid database services in open grid services architecture-data access and integration (OGSA-DAI). OGSA-DAI is an efficient grid-enabled middleware implementation of interfaces and services to access and control data sources and sinks. However, in OGSA-DAI, access control causes substantial administration overhead for resource ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society celebrates two 60-year anniversaries

    Publication Year: 2006, Page(s): 167
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Now From the Computer Society - IEEE ReadyNnotes

    Publication Year: 2006, Page(s): 168
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • TDSC Information for authors

    Publication Year: 2006, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2006, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University