By Topic

IEEE Transactions on Dependable and Secure Computing

Issue 1 • Date Jan.-March 2009

Filter Results

Displaying Results 1 - 12 of 12
  • [Front cover]

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (156 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2009, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Editorial

    Publication Year: 2009, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (126 KB) | HTML iconHTML
    Freely Available from IEEE
  • Dependability Evaluation with Dynamic Reliability Block Diagrams and Dynamic Fault Trees

    Publication Year: 2009, Page(s):4 - 17
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3370 KB) | HTML iconHTML

    Dependability evaluation is an important often-mandatory step in designing and analyzing (critical) systems. Introducing control and/or computing devices to automate processes increases the system complexity, with an impact on the overall dependability. This occurs as a consequence of interferences, dependencies, and other similar effects that cannot be adequately managed through formalisms such a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Verification of Memory Consistency in Cache-Coherent Multithreaded Computer Architectures

    Publication Year: 2009, Page(s):18 - 31
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3723 KB) | HTML iconHTML

    Multithreaded servers with cache-coherent shared memory are the dominant type of machines used to run critical network services and database management systems. To achieve the high availability required for these tasks, it is necessary to incorporate mechanisms for error detection and recovery. Correct operation of the memory system is defined by the memory consistency model. Errors can therefore ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing

    Publication Year: 2009, Page(s):32 - 44
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1445 KB) | HTML iconHTML

    Large applications executing on Grid or cluster architectures consisting of hundreds or thousands of computational nodes create problems with respect to reliability. The source of the problems are node failures and the need for dynamic configuration over extensive run-time. This paper presents two fault-tolerance mechanisms called theft induced checkpointing and systematic event logging. These are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PAPERS 
  • The Design of a Generic Intrusion-Tolerant Architecture for Web Servers

    Publication Year: 2009, Page(s):45 - 58
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1530 KB) | HTML iconHTML

    Nowadays, more and more information systems are connected to the Internet and offer Web interfaces to the general public or to a restricted set of users. Such openness makes them likely targets for intruders, and conventional protection techniques have been shown insufficient to prevent all intrusions in such open systems. This paper proposes a generic architecture to implement intrusion-tolerant ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Effectiveness of Checksums for Embedded Control Networks

    Publication Year: 2009, Page(s):59 - 72
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1743 KB) | HTML iconHTML

    Embedded control networks commonly use checksums to detect data transmission errors. However, design decisions about which checksum to use are difficult because of a lack of information about the relative effectiveness of available options. We study the error detection effectiveness of the following commonly used checksum computations: exclusive or (XOR), two's complement addition, one's complemen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Analysis of the SASI Protocol

    Publication Year: 2009, Page(s):73 - 77
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (845 KB) | HTML iconHTML

    The ultralightweight RFID protocols only involve simple bit-wise operations (like XOR, AND, OR, etc.) on tags. In this paper, we show that the ultralightweight strong authentication and strong integrity (SASI) protocol has two security vulnerabilities, namely denial-of-service (DoS) and anonymity tracing based on a compromised tag. The former permanently disables the authentication capability of a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2008 Reviewers List

    Publication Year: 2009, Page(s):78 - 80
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • TDSC Information for authors

    Publication Year: 2009, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2009, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (156 KB)
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University