By Topic

IEEE Transactions on Dependable and Secure Computing

Issue 1 • Jan.-March 2007

Filter Results

Displaying Results 1 - 13 of 13
  • [Front cover]

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2007, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • A Parsimonious Approach for Obtaining Resource-Efficient and Trustworthy Execution

    Publication Year: 2007, Page(s):1 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3535 KB) | HTML iconHTML

    We propose a resource-efficient way to execute requests in Byzantine-fault-tolerant replication that is particularly well-suited for services in which request processing is resource-intensive. Previous efforts took a failure masking all-active approach of using all execution replicas to execute all requests; at least 2t + 1 execution replicas are needed to mask t Byzantine-faulty ones. We describe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Adaptive Programming Model for Fault-Tolerant Distributed Computing

    Publication Year: 2007, Page(s):18 - 31
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1214 KB) | HTML iconHTML

    The capability of dynamically adapting to distinct runtime conditions is an important issue when designing distributed systems where negotiated quality of service (QoS) cannot always be delivered between processes. Providing fault tolerance for such dynamic environments is a challenging task. Considering such a context, this paper proposes an adaptive programming model for fault-tolerant distribut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture-Based Software Reliability Analysis: Overview and Limitations

    Publication Year: 2007, Page(s):32 - 40
    Cited by:  Papers (92)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (757 KB) | HTML iconHTML

    With the growing size and complexity of software applications, research in the area of architecture-based software reliability analysis has gained prominence. The purpose of this paper is to provide an overview of the existing research in this area, critically examine its limitations, and suggest ways to address the identified limitations View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes

    Publication Year: 2007, Page(s):41 - 55
    Cited by:  Papers (56)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5540 KB) | HTML iconHTML

    This paper reports the design principles and evaluation results of a new experimental hybrid intrusion detection system (HIDS). This hybrid system combines the advantages of low false-positive rate of signature-based intrusion detection system (IDS) and the ability of anomaly detection system (ADS) to detect novel unknown attacks. By mining anomalous traffic episodes from Internet connections, we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies

    Publication Year: 2007, Page(s):56 - 70
    Cited by:  Papers (62)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4152 KB) | HTML iconHTML

    The goals of the present contribution are twofold. First, we propose the use of a non-Gaussian long-range dependent process to model Internet traffic aggregated time series. We give the definitions and intuition behind the use of this model. We detail numerical procedures that can be used to synthesize artificial traffic exactly following the model prescription. We also propose original and practi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols

    Publication Year: 2007, Page(s):71 - 80
    Cited by:  Papers (38)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (705 KB) | HTML iconHTML

    This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography. Two three-party QKDPs, one with implicit user authentication and the other with explicit mutual authentication, are proposed to demonstrate the merits of the new combination, which include the following: 1) security ag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2006 Reviewers List

    Publication Year: 2007, Page(s):81 - 82
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • Join the IEEE Computer Society

    Publication Year: 2007, Page(s): 83
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • IEEE Computer Society Digital Library [advertisement]

    Publication Year: 2007, Page(s): 84
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • TDSC Information for authors

    Publication Year: 2007, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2007, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (99 KB)
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University