Search dblp for Publications

export results for "toc:db/journals/tdsc/tdsc1.bht:"

 download as .bib file

@article{DBLP:journals/tdsc/AtluriC04,
  author    = {Vijayalakshmi Atluri and
               Soon Ae Chun},
  title     = {An Authorization Model for Geospatial Data},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {4},
  pages     = {238--254},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.32},
  doi       = {10.1109/TDSC.2004.32},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AtluriC04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AvizienisLRL04,
  author    = {Algirdas Avizienis and
               Jean{-}Claude Laprie and
               Brian Randell and
               Carl E. Landwehr},
  title     = {Basic Concepts and Taxonomy of Dependable and Secure Computing},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {1},
  pages     = {11--33},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.2},
  doi       = {10.1109/TDSC.2004.2},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AvizienisLRL04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BartlettS04,
  author    = {Wendy Bartlett and
               Lisa Spainhower},
  title     = {Commercial Fault Tolerance: {A} Tale of Two Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {1},
  pages     = {87--96},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.4},
  doi       = {10.1109/TDSC.2004.4},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BartlettS04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BondavalliCCR04,
  author    = {Andrea Bondavalli and
               Silvano Chiaradonna and
               Domenico Cotroneo and
               Luigi Romano},
  title     = {Effective Fault Treatment for Improving the Dependability of {COTS}
               and Legacy-Based Applications},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {4},
  pages     = {223--237},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.40},
  doi       = {10.1109/TDSC.2004.40},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/BondavalliCCR04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ElnozahyP04,
  author    = {E. N. Elnozahy and
               James S. Plank},
  title     = {Checkpointing for Peta-Scale Systems: {A} Look into the Future of
               Practical Rollback-Recovery},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {2},
  pages     = {97--108},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.15},
  doi       = {10.1109/TDSC.2004.15},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ElnozahyP04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KarnikHP04,
  author    = {Tanay Karnik and
               Peter Hazucha and
               Jagdish Patel},
  title     = {Characterization of Soft Errors Caused by Single Event Upsets in {CMOS}
               Processes},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {2},
  pages     = {128--143},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.14},
  doi       = {10.1109/TDSC.2004.14},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/KarnikHP04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Leveson04,
  author    = {Nancy G. Leveson},
  title     = {A Systems-Theoretic Approach to Safety in Software-Intensive Systems},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {1},
  pages     = {66--86},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.1},
  doi       = {10.1109/TDSC.2004.1},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Leveson04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MarshS04,
  author    = {Michael A. Marsh and
               Fred B. Schneider},
  title     = {{CODEX:} {A} Robust and Secure Secret Distribution System},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {1},
  pages     = {34--47},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.3},
  doi       = {10.1109/TDSC.2004.3},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/MarshS04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NicolST04,
  author    = {David M. Nicol and
               William H. Sanders and
               Kishor S. Trivedi},
  title     = {Model-Based Evaluation: From Dependability to Security},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {1},
  pages     = {48--65},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.11},
  doi       = {10.1109/TDSC.2004.11},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/NicolST04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ParnoR04,
  author    = {Bryan Parno and
               Mema Roussopoulos},
  title     = {Defending a {P2P} Digital Preservation System},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {4},
  pages     = {209--222},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.39},
  doi       = {10.1109/TDSC.2004.39},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ParnoR04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RatanpalWB04,
  author    = {Girish B. Ratanpal and
               Ronald D. Williams and
               Travis N. Blalock},
  title     = {An On-Chip Signal Suppression Countermeasure to Power Analysis Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {3},
  pages     = {179--189},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.25},
  doi       = {10.1109/TDSC.2004.25},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/RatanpalWB04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SiewiorekCK04,
  author    = {Daniel P. Siewiorek and
               Ram Chillarege and
               Zbigniew Kalbarczyk},
  title     = {Reflections on Industry Trends and Experimental Research in Dependability},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {2},
  pages     = {109--127},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.20},
  doi       = {10.1109/TDSC.2004.20},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/SiewiorekCK04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ValeurVKK04,
  author    = {Fredrik Valeur and
               Giovanni Vigna and
               Christopher Kr{\"{u}}gel and
               Richard A. Kemmerer},
  title     = {A Comprehensive Approach to Intrusion Detection Alert Correlation},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {3},
  pages     = {146--169},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.21},
  doi       = {10.1109/TDSC.2004.21},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/ValeurVKK04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangZS04,
  author    = {Haining Wang and
               Danlu Zhang and
               Kang G. Shin},
  title     = {Change-Point Monitoring for the Detection of DoS Attacks},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {4},
  pages     = {193--208},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.34},
  doi       = {10.1109/TDSC.2004.34},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangZS04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Yi04,
  author    = {Xun Yi},
  title     = {Identity-Based Fault-Tolerant Conference Key Agreement},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {1},
  number    = {3},
  pages     = {170--178},
  year      = {2004},
  url       = {https://doi.org/10.1109/TDSC.2004.31},
  doi       = {10.1109/TDSC.2004.31},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/Yi04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics