By Topic

IEEE Transactions on Dependable and Secure Computing

Issue 3 • Date July-Sept. 2008

Filter Results

Displaying Results 1 - 11 of 11
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2008, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • Architectural Risk Analysis of Software Systems Based on Security Patterns

    Publication Year: 2008, Page(s):129 - 142
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3892 KB) | HTML iconHTML

    The importance of software security has been profound, since most attacks to software systems are based on vulnerabilities caused by poorly designed and developed software. Furthermore, the enforcement of security in software systems at the design phase can reduce the high cost and effort associated with the introduction of security during implementation. For this purpose, security patterns that o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Path Management with Resilience Constraints under Multiple Link Failures in MPLS/GMPLS Networks

    Publication Year: 2008, Page(s):143 - 154
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1249 KB) | HTML iconHTML

    Most previous research on MPLS/GMPLS recovery management has focused on efficient routing or signaling methods from single failures. However, multiple simultaneous failures may occur in large-scale complex virtual paths of MPLS/GMPLS networks. In this paper, we present a dynamic MPLS/GMPLS path management strategy in which the path recovery mechanism can rapidly find an optimal backup path which s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generalized Ring Signatures

    Publication Year: 2008, Page(s):155 - 163
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    Ring signature was first introduced in 2001. In a ring signature, instead of revealing the actual identity of the message signer, it specifies a set of possible signers. The verifier can be convinced that the signature was indeed generated by one of the ring members, however, she is unable to tell which member actually produced the signature. In this paper, we propose a generalized ring signature ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High-Level Side-Channel Attack Modeling and Simulation for Security-Critical Systems on Chips

    Publication Year: 2008, Page(s):164 - 176
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2721 KB) | HTML iconHTML

    The design flow of a digital cryptographic device must take into account the evaluation of its security against attacks based on side channels observation. The adoption of high level countermeasures, as well as the verification of the feasibility of new attacks, presently require the execution of time-consuming physical measurements on the prototype product or the simulation at a low abstraction l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission

    Publication Year: 2008, Page(s):177 - 190
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1705 KB) | HTML iconHTML

    In random key predistribution techniques for wireless sensor networks, a relatively small number of keys are randomly chosen from a large key pool and are loaded on the sensors prior to deployment. After deployment, each sensor tries finding a common key shared by itself and each of its neighbors to establish a link key to protect the wireless communication between themselves. One intrinsic disadv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Build Your Career in Computing [advertisement]

    Publication Year: 2008, Page(s): 191
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • 180,000 Computing Articles in the IEEE Computer Society Digital Library [advertisement]

    Publication Year: 2008, Page(s): 192
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • TDSC Information for authors

    Publication Year: 2008, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2008, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University