By Topic

Dependable and Secure Computing, IEEE Transactions on

Issue 3 • Date July-Sept. 2006

Filter Results

Displaying Results 1 - 15 of 15
  • [Front cover]

    Publication Year: 2006 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (136 KB)  
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2006 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (89 KB)  
    Freely Available from IEEE
  • Guest Editorial for the Special Issue on the 2005 IEEE/IFIP Conference on Dependable Systems and Networks, including the Dependable Computing and Communications and Performance and Dependability Symposia

    Publication Year: 2006 , Page(s): 169 - 171
    Save to Project icon | Request Permissions | PDF file iconPDF (120 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Dependability through Assured Reconfiguration in Embedded System Software

    Publication Year: 2006 , Page(s): 172 - 187
    Cited by:  Papers (12)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3420 KB) |  | HTML iconHTML  

    In many software systems, properties necessary for dependable operation are only a small subset of all desirable system properties. Assuring properties over the simpler subset can provide assurance of critical properties over the entire system. This work provides a method for constructing systems to be dependably reconfigurable. A system's primary function can have less demanding dependability req... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ReStore: Symptom-Based Soft Error Detection in Microprocessors

    Publication Year: 2006 , Page(s): 188 - 201
    Cited by:  Papers (42)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2325 KB) |  | HTML iconHTML  

    Device scaling and large-scale integration have led to growing concerns about soft errors in microprocessors. To date, in all but the most demanding applications, implementing parity and ECC for caches and other large, regular SRAM structures have been sufficient to stem the growing soft error tide. This will not be the case for long and questions remain as to the best way to detect and recover fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast Byzantine Consensus

    Publication Year: 2006 , Page(s): 202 - 215
    Cited by:  Papers (21)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2408 KB) |  | HTML iconHTML  

    We present the first protocol that reaches asynchronous Byzantine consensus in two communication steps in the common case. We prove that our protocol is optimal in terms of both number of communication steps and number of processes for two-step consensus. The protocol can be used to build a replicated state machine that requires only three communication steps per request in the common case. Furthe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System Call Monitoring Using Authenticated System Calls

    Publication Year: 2006 , Page(s): 216 - 229
    Cited by:  Papers (7)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1409 KB) |  | HTML iconHTML  

    System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the program's normal behavior. Here, we introduce a new approach to implementing system call monitoring based on authenticated system calls. An authenticated system call is a system call augmented with extra arguments that spe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting and Isolating Malicious Routers

    Publication Year: 2006 , Page(s): 230 - 244
    Cited by:  Papers (13)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1306 KB) |  | HTML iconHTML  

    Network routers occupy a unique role in modern distributed systems. They are responsible for cooperatively shuttling packets amongst themselves in order to provide the illusion of a network with universal point-to-point connectivity. However, this illusion is shattered - as are implicit assumptions of availability, confidentiality, or integrity - when network routers are subverted to act in a mali... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Approach for Phase-Type Fitting with the EM Algorithm

    Publication Year: 2006 , Page(s): 245 - 258
    Cited by:  Papers (18)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (4450 KB) |  | HTML iconHTML  

    The representation of general distributions or measured data by phase-type distributions is an important and nontrivial task in analytical modeling. Although a large number of different methods for fitting parameters of phase-type distributions to data traces exist, many approaches lack efficiency and numerical stability. In this paper, a novel approach is presented that fits a restricted class of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining Response Surface Methodology with Numerical Methods for Optimization of Markovian Models

    Publication Year: 2006 , Page(s): 259 - 269
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2152 KB) |  | HTML iconHTML  

    In general, decision support is one of the main purposes of model-based analysis of systems. Response surface methodology (RSM) is an optimization technique that has been applied frequently in practice, but few automated variants are currently available. In this paper, we show how to combine RSM with numerical analysis methods to optimize continuous time Markov chain models. Among the many known n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Join the IEEE Computer Society

    Publication Year: 2006 , Page(s): 270
    Save to Project icon | Request Permissions | PDF file iconPDF (43 KB)  
    Freely Available from IEEE
  • IEEE Computer Society celebrates two 60-year anniversaries

    Publication Year: 2006 , Page(s): 271
    Save to Project icon | Request Permissions | PDF file iconPDF (102 KB)  
    Freely Available from IEEE
  • Now From the Computer Society - IEEE ReadyNotes

    Publication Year: 2006 , Page(s): 272
    Save to Project icon | Request Permissions | PDF file iconPDF (66 KB)  
    Freely Available from IEEE
  • TDSC Information for authors

    Publication Year: 2006 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (89 KB)  
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2006 , Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (136 KB)  
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University