


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 2
Volume 2, Number 1, January-March 2005
- Ravishankar K. Iyer:

Editorial: State of the Journal Address. 1
- Elisa Bertino, Ravi S. Sandhu:

Database Security-Concepts, Approaches, and Challenges. 2-19 - Wenbing Zhao, Louise E. Moser, P. M. Melliar-Smith:

Unification of Transactions and Replication in Three-Tier Architectures Based on CORBA. 20-33 - Yingjiu Li, Vipin Swarup, Sushil Jajodia:

Fingerprinting Relational Databases: Schemes and Specialties. 34-45 - Roy Friedman, Achour Mostéfaoui, Michel Raynal:

Simple and Efficient Oracle-Based Consensus Protocols for Asynchronous Byzantine Systems. 46-56 - Cung Nguyen, G. Robert Redinbo:

Fault Tolerance Design in JPEG 2000 Image Compression System. 57-75
Volume 2, Number 2, April-June 2005
- Vern Paxson, Michael Waidner

:
Guest Editor's Introduction: 2005 IEEE Symposium on Security and Privacy. 81 - Paul C. van Oorschot

, Anil Somayaji, Glenn Wurster:
Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance. 82-92 - Tadayoshi Kohno, Andre Broido, Kimberly C. Claffy

:
Remote Physical Device Fingerprintin. 93-108 - Michael Backes, Birgit Pfitzmann:

Relating Symbolic and Cryptographic Secrecy. 109-123
- Kalyanaraman Vaidyanathan, Kishor S. Trivedi:

A Comprehensive Model for Software Rejuvenation. 124-137 - Xubin He, Ming Zhang, Qing Yang:

SPEK: A Storage Performance Evaluation Kernel Module for Block-Level Storage Systems under Faulty Conditions. 138-149 - Ioannis Voyiatzis, Constantin Halatsis:

A Low-Cost Concurrent BIST Scheme for Increased Dependability. 150-156 - James Joshi, Elisa Bertino, Arif Ghafoor:

An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model. 157-175
Volume 2, Number 3, July-September 2005
- Kun Sun, Peng Ning, Cliff Wang:

Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks. 177-189 - Irith Pomeranz, Sudhakar M. Reddy:

Concurrent Online Testing of Identical Circuits Using Nonidentical Input Vectors. 190-200 - Sandeep S. Kulkarni

, Ali Ebnenasir:
Complexity Issues in Automated Synthesis of Failsafe Fault-Tolerance. 201-215 - Jelena Mirkovic, Peter L. Reiher:

D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks. 216-232 - Haowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan:

On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. 233-247 - Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik:

Secure Spread: An Integrated Architecture for Secure Group Communication. 248-261
- Benjamin B. M. Shao:

Optimal Redundancy Allocation for Information Technology Disaster Recovery in the Network Economy. 262-267 - István Zsolt Berta, Levente Buttyán, István Vajda:

A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals. 268-272
Volume 2, Number 4, October-December 2005
- Paul D. Ezhilchelvan

, Santosh K. Shrivastava:
A Family of Trusted Third Party Based Fair-Exchange Protocols. 273-286 - Jichiang Tsai:

An Efficient Index-Based Checkpointing Protocol with Constant-Size Control Information on Messages. 287-296 - Fred A. Bower, Sule Ozev, Daniel J. Sorin:

Autonomic Microprocessor Execution via Self-Repairing Arrays. 297-310 - Jun Luo

, Jean-Pierre Hubaux, Patrick Th. Eugster:
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks. 311-323 - Jian Yuan, Kevin L. Mills:

Monitoring the Macroscopic Effect of DDoS Flooding Attacks. 324-335 - Yung-Ruei Chang, Suprasad V. Amari, Sy-Yen Kuo

:
OBDD-Based Evaluation of Reliability and Importance Measures for Multistate Systems Subject to Imperfect Fault Coverage. 336-347
- Sandeep S. Kulkarni

, Ali Ebnenasir:
The Effect of the Specification Model on the Complexity of Adding Masking Fault Tolerance. 348-355

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














