By Topic

IEEE Transactions on Dependable and Secure Computing

Issue 1 • Date Jan.-March 2010

Filter Results

Displaying Results 1 - 14 of 14
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2010, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • Editorial

    Publication Year: 2010, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (169 KB) | HTML iconHTML
    Freely Available from IEEE
  • Editorial

    Publication Year: 2010, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (41 KB) | HTML iconHTML
    Freely Available from IEEE
  • A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory

    Publication Year: 2010, Page(s):5 - 19
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1949 KB) | HTML iconHTML

    In recent years, a number of puzzle-based defense mechanisms have been proposed against flooding denial-of-service (DoS) attacks in networks. Nonetheless, these mechanisms have not been designed through formal approaches and thereby some important design issues such as effectiveness and optimality have remained unresolved. This paper utilizes game theory to propose a series of optimal puzzle-based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey on the Encryption of Convergecast Traffic with In-Network Processing

    Publication Year: 2010, Page(s):20 - 34
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1282 KB) | HTML iconHTML

    We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate nodes. Other than hop-by-hop based encryption approaches, aggregator nodes can perform in-network processing on encrypted data. Since it is not required to decrypt the incoming ciphers before aggregating, substantial advantages... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Layered Approach Using Conditional Random Fields for Intrusion Detection

    Publication Year: 2010, Page(s):35 - 49
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3848 KB) | HTML iconHTML

    Intrusion detection faces a number of challenges; an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper, we address these two issues of Accuracy and Efficiency using Conditional Random Fields and Layered Approach. We demonstrate that high attack detection accuracy can be achi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Data Objects Replication in Data Grid

    Publication Year: 2010, Page(s):50 - 64
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2127 KB) | HTML iconHTML

    Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical information. To achieve performance goals in data accesses, these data fragmentation approaches can be combined with dynamic replication. In this paper, we consider data partitioning (both secret sharing and erasure coding) and dyna... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SigFree: A Signature-Free Buffer Overflow Attack Blocker

    Publication Year: 2010, Page(s):65 - 79
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2107 KB) | HTML iconHTML

    We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet services such as Web service. Motivated by the observation that buffer overflow attacks typically contain executables whereas legitimate client requests never contain executables in most Internet services, SigFree blocks atta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks

    Publication Year: 2010, Page(s):80 - 93
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1586 KB) | HTML iconHTML Multimedia Media

    This paper presents the first hierarchical byzantine fault-tolerant replication architecture suitable to systems that span multiple wide-area sites. The architecture confines the effects of any malicious replica to its local site, reduces message complexity of wide-area communication, and allows read-only queries to be performed locally within a site for the price of additional standard hardware. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Underutilized CPU Resources to Enhance Its Reliability

    Publication Year: 2010, Page(s):94 - 109
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5107 KB) | HTML iconHTML

    Soft errors (or transient faults) are temporary faults that arise in a circuit due to a variety of internal noise and external sources such as cosmic particle hits. Though soft errors still occur infrequently, they are rapidly becoming a major impediment to processor reliability. This is due primarily to processor scaling characteristics. In the past, systems designed to tolerate such faults utili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2009 Reviewers List

    Publication Year: 2010, Page(s):110 - 112
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • TDSC Information for authors

    Publication Year: 2010, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2010, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University