By Topic

IEEE Transactions on Dependable and Secure Computing

Issue 4 • Date Oct.-Dec. 2006

Filter Results

Displaying Results 1 - 17 of 17
  • [Front cover]

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2006, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • An Experimental Study of Internet Path Diversity

    Publication Year: 2006, Page(s):273 - 288
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3498 KB) | HTML iconHTML

    Several research studies have been devoted to improving the reliability and performance of the Internet by utilizing redundant communication paths between end points. Multihoming, coupled with intelligent route control, and overlay networks are two main streams in this area of research which attempt to leverage redundant connections of the Internet for increased reliability and performance. Howeve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Synthesis of Efficient Intrusion Detection Systems on FPGAs

    Publication Year: 2006, Page(s):289 - 300
    Cited by:  Papers (16)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2746 KB) | HTML iconHTML

    This paper presents a methodology and a tool for automatic synthesis of highly efficient intrusion detection systems using a high-level, graph-based partitioning methodology and tree-based lookahead architectures. Intrusion detection for network security is a compute-intensive application demanding high system performance. The tools implement and automate a customizable flow for the creation of ef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)

    Publication Year: 2006, Page(s):301 - 311
    Cited by:  Papers (67)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2780 KB) | HTML iconHTML

    An effective approach to phishing Web page detection is proposed, which uses Earth mover's distance (EMD) to measure Web page visual similarity. We first convert the involved Web pages into low resolution images and then use color and coordinate features to represent the image signatures. We use EMD to calculate the signature distances of the images of the Web pages. We train an EMD threshold vect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and Tracking of Transaction Flow Dynamics for Fault Detection in Complex Systems

    Publication Year: 2006, Page(s):312 - 326
    Cited by:  Papers (31)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2403 KB) | HTML iconHTML

    With the prevalence of Internet services and the increase of their complexity, there is a growing need to improve their operational reliability and availability. While a large amount of monitoring data can be collected from systems for fault analysis, it is hard to correlate this data effectively across distributed systems and observation time. In this paper, we analyze the mass characteristics of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural Network Techniques for Proactive Password Checking

    Publication Year: 2006, Page(s):327 - 339
    Cited by:  Papers (9)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3892 KB) | HTML iconHTML

    This paper deals with the access control problem. We assume that valuable resources need to be protected against unauthorized users and that, to this aim, a password-based access control scheme is employed. Such an abstract scenario captures many applicative settings. The issue we focus our attention on is the following: password-based schemes provide a certain level of security as long as users c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OACerts: Oblivious Attribute Certificates

    Publication Year: 2006, Page(s):340 - 352
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (601 KB) | HTML iconHTML

    We propose oblivious attribute certificates (OACerts), an attribute certificate scheme in which a certificate holder can select which attributes to use and how to use them. In particular, a user can use attribute values stored in an OACert obliviously, i.e., the user obtains a service if and only if the attribute values satisfy the policy of the service provider, yet the service provider learns no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing Data Cache Susceptibility to Soft Errors

    Publication Year: 2006, Page(s):353 - 364
    Cited by:  Papers (28)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4004 KB) | HTML iconHTML

    Data caches are a fundamental component of most modern microprocessors. They provide for efficient read/write access to data memory. Errors occurring in the data cache can corrupt data values or state, and can easily propagate throughout the memory hierarchy. One of the main threats to data cache reliability is soft (transient, nonreproducible) errors. These errors can occur more often than hard (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Bit: Transparent, Hardware Buffer-Overflow Protection

    Publication Year: 2006, Page(s):365 - 376
    Cited by:  Papers (7)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (778 KB) | HTML iconHTML

    We propose a minimalist, architectural approach, Secure Bit (patent pending), to protect against buffer overflow attacks on control data (return-address and function-pointer attacks in particular). Secure Bit provides a hardware bit to protect the integrity of addresses for the purpose of preventing such buffer-overflow attacks. Secure Bit is transparent to user software: it provides backward comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Location Verification Using Radio Broadcast

    Publication Year: 2006, Page(s):377 - 385
    Cited by:  Papers (27)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB) | HTML iconHTML

    Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially malicious prover is located in a designated area. The original solution to the problem, as well as solutions to related problems, exploits the difference between propagation speeds of radio and sound waves to estimate th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing Mobile Ad Hoc Networks with Certificateless Public Keys

    Publication Year: 2006, Page(s):386 - 399
    Cited by:  Papers (98)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1675 KB) | HTML iconHTML

    This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present IKM, an ID-based key management scheme as a novel combination of ID-based and threshold cryptography. IKM is a certificateless solution in that public keys of mobile nodes are directly derivable from their known IDs plus some common information. It thus eliminates the need for certifica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correction to "Fast Byzantine Consensus"

    Publication Year: 2006, Page(s): 400
    Request permission for commercial reuse | PDF file iconPDF (38 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2006 Annual Index

    Publication Year: 2006, Page(s):401 - 405
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Join the IEEE Computer Society

    Publication Year: 2006, Page(s):406 - 408
    Request permission for commercial reuse | PDF file iconPDF (320 KB)
    Freely Available from IEEE
  • TDSC Information for authors

    Publication Year: 2006, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2006, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University