By Topic

Dependable and Secure Computing, IEEE Transactions on

Issue 2 • Date April-June 2007

Filter Results

Displaying Results 1 - 10 of 10
  • [Front cover]

    Publication Year: 2007 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (98 KB)  
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2007 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (80 KB)  
    Freely Available from IEEE
  • Editorial: Dependability and Security

    Publication Year: 2007 , Page(s): 85 - 87
    Save to Project icon | Request Permissions | PDF file iconPDF (111 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation

    Publication Year: 2007 , Page(s): 88 - 104
    Cited by:  Papers (5)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3948 KB) |  | HTML iconHTML  

    Fast and accurate generation of worm signatures is essential to contain zero-day worms at the Internet scale. Recent work has shown that signature generation can be automated by analyzing the repetition of worm substrings (that is, fingerprints) and their address dispersion. However, at the early stage of a worm outbreak, individual edge networks are often short of enough worm exploits for generat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms

    Publication Year: 2007 , Page(s): 105 - 118
    Cited by:  Papers (35)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2085 KB) |  | HTML iconHTML  

    As many people rely on e-mail communications for business and everyday life, Internet e-mail worms constitute one of the major security threats for our society. Unlike scanning worms such as Code Red or Slammer, e-mail worms spread over a logical network defined by e-mail address relationships, making traditional epidemic models invalid for modeling the propagation of e-mail worms. In addition, we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast Worm Containment Using Feedback Control

    Publication Year: 2007 , Page(s): 119 - 136
    Cited by:  Papers (7)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (4009 KB) |  | HTML iconHTML  

    In a computer network, network security is accomplished using elements such as firewalls, hosts, servers, routers, intrusion detection systems, and honey pots. These network elements need to know the nature or anomaly of the worm a priori to detect the attack. Modern viruses such as Code Red, Sapphire, and Nimda spread quickly. Therefore, it is impractical if not impossible for human mediated resp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Computer Intrusions Using Sequences of Function Calls

    Publication Year: 2007 , Page(s): 137 - 150
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2355 KB) |  | HTML iconHTML  

    This paper demonstrates the value of analyzing sequences of function calls for forensic analysis. Although this approach has been used for intrusion detection (that is, determining that a system has been attacked), its value in isolating the cause and effects of the attack has not previously been shown. We also look for not only the presence of unexpected events but also the absence of expected ev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey and Analysis of the P3P Protocol's Agents, Adoption, Maintenance, and Future

    Publication Year: 2007 , Page(s): 151 - 164
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (5292 KB) |  | HTML iconHTML  

    In this paper, we survey the adoption of the platform for privacy preferences protocol (P3P) on Internet Web sites to determine if P3P is a growing or stagnant technology. We conducted a pilot survey in February 2005 and our full survey in November 2005. We compare the results from these two surveys and the previous (July 2003) survey of P3P adoption. In general, we find that P3P adoption is stagn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TDSC Information for authors

    Publication Year: 2007 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (80 KB)  
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2007 , Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (98 KB)  
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University