By Topic

IEEE Transactions on Dependable and Secure Computing

Issue 1 • Jan.-March 2006

Filter Results

Displaying Results 1 - 15 of 15
  • [Front cover]

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2006, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (92 KB)
    Freely Available from IEEE
  • Editorial:Dependability and Security - Looking Foward to 2006

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (30 KB) | HTML iconHTML
    Freely Available from IEEE
  • From set membership to group membership: a separation of concerns

    Publication Year: 2006, Page(s):2 - 12
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1056 KB) | HTML iconHTML

    We revisit the well-known group membership problem and show how it can be considered a special case of a simple problem, the set membership problem. In the set membership problem, processes maintain a set whose elements are drawn from an arbitrary universe: They can request the addition or removal of elements to/from that set, and they agree on the current value of the set. Group membership corres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Achieving privacy in trust negotiations with an ontology-based approach

    Publication Year: 2006, Page(s):13 - 30
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1760 KB) | HTML iconHTML

    The increasing use of Internet in a variety of distributed multiparty interactions and transactions with strong real-time requirements has pushed the search for solutions to the problem of attribute-based digital interactions. A promising solution today is represented by automated trust negotiation systems. Trust negotiation systems allow subjects in different security domains to securely exchange... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An active splitter architecture for intrusion detection and prevention

    Publication Year: 2006, Page(s):31 - 44
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1000 KB) | HTML iconHTML

    State-of-the-art high-speed network intrusion detection and prevention systems are often designed using multiple intrusion detection sensors operating in parallel coupled with a suitable front-end load-balancing traffic splitter. In this paper, we argue that, rather than just passively providing generic load distribution, traffic splitters should implement more active operations on the traffic str... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicast

    Publication Year: 2006, Page(s):45 - 61
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1456 KB) | HTML iconHTML

    We propose a framework and methodology for quantifying the effect of denial of service (DoS) attacks on a distributed system. We present a systematic study of the resistance of gossip-based multicast protocols to DoS attacks. We show that even distributed and randomized gossip-based protocols, which eliminate single points of failure, do not necessarily eliminate vulnerabilities to DoS attacks. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A key predistribution scheme for sensor networks using deployment knowledge

    Publication Year: 2006, Page(s):62 - 77
    Cited by:  Papers (83)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1600 KB) | HTML iconHTML

    To achieve security in wireless sensor networks, it is important to be able to encrypt messages sent among sensor nodes. Keys for encryption purposes must be agreed upon by communicating nodes. Due to resource constraints, achieving such key agreement in wireless sensor networks is nontrivial. Many key agreement schemes used in general networks, such as Diffie-Hellman and public-key-based schemes,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Install-time vaccination of Windows executables to defend against stack smashing attacks

    Publication Year: 2006, Page(s):78 - 90
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB) | HTML iconHTML

    Stack smashing is still one of the most popular techniques for computer system attack. In this work, we present an anti-stack-smashing defense technique for Microsoft Windows systems. Our approach works at install-time, and does not rely on having access to the source-code: The user decides when and which executables to vaccinate. Our technique consists of instrumenting a given executable with a m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Merging: an efficient solution for a time-bound hierarchical key assignment scheme

    Publication Year: 2006, Page(s):91 - 100
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB) | HTML iconHTML

    Conventional hierarchical key assignment schemes have not been concerned with a practical situation: Users might be assigned to a class for only a period of time. When a user leaves a class, the keys of that class and all the descendent classes must be renewed. For applications where the privileges of users change frequently or where there are many users, the communication load for key redistribut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2005 Reviewers List

    Publication Year: 2006, Page(s):101 - 102
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2006, Page(s): 103
    Request permission for commercial reuse | PDF file iconPDF (470 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2006, Page(s): 104
    Request permission for commercial reuse | PDF file iconPDF (470 KB)
    Freely Available from IEEE
  • TDSC Information for authors

    Publication Year: 2006, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (92 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2006, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University