Journal: IEEE Trans. Dependable Sec. Comput.

Volume 2, Issue 4

273 -- 286Paul D. Ezhilchelvan, Santosh K. Shrivastava. A Family of Trusted Third Party Based Fair-Exchange Protocols
287 -- 296Jichiang Tsai. An Efficient Index-Based Checkpointing Protocol with Constant-Size Control Information on Messages
297 -- 310Fred A. Bower, Sule Ozev, Daniel J. Sorin. Autonomic Microprocessor Execution via Self-Repairing Arrays
311 -- 323Jun Luo, Jean-Pierre Hubaux, Patrick Th. Eugster. DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks
324 -- 335Jian Yuan, Kevin L. Mills. Monitoring the Macroscopic Effect of DDoS Flooding Attacks
336 -- 347Yung-Ruei Chang, Suprasad V. Amari, Sy-Yen Kuo. OBDD-Based Evaluation of Reliability and Importance Measures for Multistate Systems Subject to Imperfect Fault Coverage
348 -- 355Sandeep S. Kulkarni, Ali Ebnenasir. The Effect of the Specification Model on the Complexity of Adding Masking Fault Tolerance

Volume 2, Issue 3

177 -- 189Kun Sun, Peng Ning, Cliff Wang. Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks
190 -- 200Irith Pomeranz, Sudhakar M. Reddy. Concurrent Online Testing of Identical Circuits Using Nonidentical Input Vectors
201 -- 215Sandeep S. Kulkarni, Ali Ebnenasir. Complexity Issues in Automated Synthesis of Failsafe Fault-Tolerance
216 -- 232Jelena Mirkovic, Peter L. Reiher. D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks
233 -- 247Haowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan. On the Distribution and Revocation of Cryptographic Keys in Sensor Networks
248 -- 261Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik. Secure Spread: An Integrated Architecture for Secure Group Communication
262 -- 267Benjamin B. M. Shao. Optimal Redundancy Allocation for Information Technology Disaster Recovery in the Network Economy
268 -- 272István Zsolt Berta, Levente Buttyán, István Vajda. A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals

Volume 2, Issue 2

81 -- 0Vern Paxson, Michael Waidner. Guest Editor s Introduction: 2005 IEEE Symposium on Security and Privacy
82 -- 92Paul C. van Oorschot, Anil Somayaji, Glenn Wurster. Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance
93 -- 108Tadayoshi Kohno, Andre Broido, Kimberly C. Claffy. Remote Physical Device Fingerprintin
109 -- 123Michael Backes, Birgit Pfitzmann. Relating Symbolic and Cryptographic Secrecy
124 -- 137Kalyanaraman Vaidyanathan, Kishor S. Trivedi. A Comprehensive Model for Software Rejuvenation
138 -- 149Xubin He, Ming Zhang, Qing Yang. SPEK: A Storage Performance Evaluation Kernel Module for Block-Level Storage Systems under Faulty Conditions
150 -- 156Ioannis Voyiatzis, Constantin Halatsis. A Low-Cost Concurrent BIST Scheme for Increased Dependability
157 -- 175James Joshi, Elisa Bertino, Arif Ghafoor. An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model

Volume 2, Issue 1

1 -- 0Ravishankar K. Iyer. Editorial: State of the Journal Address
2 -- 19Elisa Bertino, Ravi S. Sandhu. Database Security-Concepts, Approaches, and Challenges
20 -- 33Wenbing Zhao, Louise E. Moser, P. M. Melliar-Smith. Unification of Transactions and Replication in Three-Tier Architectures Based on CORBA
34 -- 45Yingjiu Li, Vipin Swarup, Sushil Jajodia. Fingerprinting Relational Databases: Schemes and Specialties
46 -- 56Roy Friedman, Achour Mostéfaoui, Michel Raynal. Simple and Efficient Oracle-Based Consensus Protocols for Asynchronous Byzantine Systems
57 -- 75Cung Nguyen, G. Robert Redinbo. Fault Tolerance Design in JPEG 2000 Image Compression System