Introduction to the IEEE Transactions on Dependable and Secure Computing

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on dependable and secure computing 2004-01, Vol.1 (1), p.2-3
1. Verfasser: Iyer, R.K.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 3
container_issue 1
container_start_page 2
container_title IEEE transactions on dependable and secure computing
container_volume 1
creator Iyer, R.K.
description
doi_str_mv 10.1109/TDSC.2004.10
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_206535194</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1335463</ieee_id><sourcerecordid>1027262881</sourcerecordid><originalsourceid>FETCH-LOGICAL-c212t-4e920697fd3aa14b20c3a7d01b6759bd7970762835151d728e970ef4460c9ebb3</originalsourceid><addsrcrecordid>eNpFkL1PwzAQxS0EEqWwsbFYzKScv-J4RCHQSpUYWubISS6Qqk2C7Qz897gUielO7373nvQIuWWwYAzM4_Z5ky84gFwwOCMzZiRLAFh2HnclVaKMZpfkyvsdAJeZkTOyXPXBDc1Uh27oaRho-ES6KoqCbp3tvf3VPY23Zxyxb2y1R2r7hm6wnhzSfDiMU-j6j2ty0dq9x5u_OSfvL8U2Xybrt9dV_rROas54SCQaDqnRbSOsZbLiUAurG2BVqpWpGm006JRnQjHFGs0zjAK2UqZQG6wqMSf3J9_RDV8T-lDuhsn1MbKMxir-GRmhhxNUu8F7h205uu5g3XfJoDxWVR6rKo9VRSXidye8Q8R_VAglUyF-AHlSYsg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>206535194</pqid></control><display><type>article</type><title>Introduction to the IEEE Transactions on Dependable and Secure Computing</title><source>IEEE Electronic Library (IEL)</source><creator>Iyer, R.K.</creator><creatorcontrib>Iyer, R.K.</creatorcontrib><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2004.10</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>Washington: IEEE</publisher><subject>Authentication ; Availability ; Context modeling ; Cryptographic protocols ; Cryptography ; Fault tolerance ; Fault tolerant systems ; Information security ; Intrusion detection ; Participation ; Robustness ; Society ; Software ; Telecommunication computing ; Trends</subject><ispartof>IEEE transactions on dependable and secure computing, 2004-01, Vol.1 (1), p.2-3</ispartof><rights>Copyright IEEE Computer Society Jan-Mar 2004</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c212t-4e920697fd3aa14b20c3a7d01b6759bd7970762835151d728e970ef4460c9ebb3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1335463$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1335463$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Iyer, R.K.</creatorcontrib><title>Introduction to the IEEE Transactions on Dependable and Secure Computing</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><subject>Authentication</subject><subject>Availability</subject><subject>Context modeling</subject><subject>Cryptographic protocols</subject><subject>Cryptography</subject><subject>Fault tolerance</subject><subject>Fault tolerant systems</subject><subject>Information security</subject><subject>Intrusion detection</subject><subject>Participation</subject><subject>Robustness</subject><subject>Society</subject><subject>Software</subject><subject>Telecommunication computing</subject><subject>Trends</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2004</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNpFkL1PwzAQxS0EEqWwsbFYzKScv-J4RCHQSpUYWubISS6Qqk2C7Qz897gUielO7373nvQIuWWwYAzM4_Z5ky84gFwwOCMzZiRLAFh2HnclVaKMZpfkyvsdAJeZkTOyXPXBDc1Uh27oaRho-ES6KoqCbp3tvf3VPY23Zxyxb2y1R2r7hm6wnhzSfDiMU-j6j2ty0dq9x5u_OSfvL8U2Xybrt9dV_rROas54SCQaDqnRbSOsZbLiUAurG2BVqpWpGm006JRnQjHFGs0zjAK2UqZQG6wqMSf3J9_RDV8T-lDuhsn1MbKMxir-GRmhhxNUu8F7h205uu5g3XfJoDxWVR6rKo9VRSXidye8Q8R_VAglUyF-AHlSYsg</recordid><startdate>200401</startdate><enddate>200401</enddate><creator>Iyer, R.K.</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L6V</scope><scope>M0C</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>PYYUZ</scope><scope>Q9U</scope></search><sort><creationdate>200401</creationdate><title>Introduction to the IEEE Transactions on Dependable and Secure Computing</title><author>Iyer, R.K.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c212t-4e920697fd3aa14b20c3a7d01b6759bd7970762835151d728e970ef4460c9ebb3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Authentication</topic><topic>Availability</topic><topic>Context modeling</topic><topic>Cryptographic protocols</topic><topic>Cryptography</topic><topic>Fault tolerance</topic><topic>Fault tolerant systems</topic><topic>Information security</topic><topic>Intrusion detection</topic><topic>Participation</topic><topic>Robustness</topic><topic>Society</topic><topic>Software</topic><topic>Telecommunication computing</topic><topic>Trends</topic><toplevel>online_resources</toplevel><creatorcontrib>Iyer, R.K.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><collection>ABI/INFORM Collection China</collection><collection>ProQuest Central Basic</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Iyer, R.K.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Introduction to the IEEE Transactions on Dependable and Secure Computing</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2004-01</date><risdate>2004</risdate><volume>1</volume><issue>1</issue><spage>2</spage><epage>3</epage><pages>2-3</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><cop>Washington</cop><pub>IEEE</pub><doi>10.1109/TDSC.2004.10</doi><tpages>2</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1545-5971
ispartof IEEE transactions on dependable and secure computing, 2004-01, Vol.1 (1), p.2-3
issn 1545-5971
1941-0018
language eng
recordid cdi_proquest_journals_206535194
source IEEE Electronic Library (IEL)
subjects Authentication
Availability
Context modeling
Cryptographic protocols
Cryptography
Fault tolerance
Fault tolerant systems
Information security
Intrusion detection
Participation
Robustness
Society
Software
Telecommunication computing
Trends
title Introduction to the IEEE Transactions on Dependable and Secure Computing
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T01%3A54%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Introduction%20to%20the%20IEEE%20Transactions%20on%20Dependable%20and%20Secure%20Computing&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Iyer,%20R.K.&rft.date=2004-01&rft.volume=1&rft.issue=1&rft.spage=2&rft.epage=3&rft.pages=2-3&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2004.10&rft_dat=%3Cproquest_RIE%3E1027262881%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=206535194&rft_id=info:pmid/&rft_ieee_id=1335463&rfr_iscdi=true