Introduction to the IEEE Transactions on Dependable and Secure Computing
Gespeichert in:
Veröffentlicht in: | IEEE transactions on dependable and secure computing 2004-01, Vol.1 (1), p.2-3 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3 |
---|---|
container_issue | 1 |
container_start_page | 2 |
container_title | IEEE transactions on dependable and secure computing |
container_volume | 1 |
creator | Iyer, R.K. |
description | |
doi_str_mv | 10.1109/TDSC.2004.10 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_206535194</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1335463</ieee_id><sourcerecordid>1027262881</sourcerecordid><originalsourceid>FETCH-LOGICAL-c212t-4e920697fd3aa14b20c3a7d01b6759bd7970762835151d728e970ef4460c9ebb3</originalsourceid><addsrcrecordid>eNpFkL1PwzAQxS0EEqWwsbFYzKScv-J4RCHQSpUYWubISS6Qqk2C7Qz897gUielO7373nvQIuWWwYAzM4_Z5ky84gFwwOCMzZiRLAFh2HnclVaKMZpfkyvsdAJeZkTOyXPXBDc1Uh27oaRho-ES6KoqCbp3tvf3VPY23Zxyxb2y1R2r7hm6wnhzSfDiMU-j6j2ty0dq9x5u_OSfvL8U2Xybrt9dV_rROas54SCQaDqnRbSOsZbLiUAurG2BVqpWpGm006JRnQjHFGs0zjAK2UqZQG6wqMSf3J9_RDV8T-lDuhsn1MbKMxir-GRmhhxNUu8F7h205uu5g3XfJoDxWVR6rKo9VRSXidye8Q8R_VAglUyF-AHlSYsg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>206535194</pqid></control><display><type>article</type><title>Introduction to the IEEE Transactions on Dependable and Secure Computing</title><source>IEEE Electronic Library (IEL)</source><creator>Iyer, R.K.</creator><creatorcontrib>Iyer, R.K.</creatorcontrib><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2004.10</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>Washington: IEEE</publisher><subject>Authentication ; Availability ; Context modeling ; Cryptographic protocols ; Cryptography ; Fault tolerance ; Fault tolerant systems ; Information security ; Intrusion detection ; Participation ; Robustness ; Society ; Software ; Telecommunication computing ; Trends</subject><ispartof>IEEE transactions on dependable and secure computing, 2004-01, Vol.1 (1), p.2-3</ispartof><rights>Copyright IEEE Computer Society Jan-Mar 2004</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c212t-4e920697fd3aa14b20c3a7d01b6759bd7970762835151d728e970ef4460c9ebb3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1335463$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1335463$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Iyer, R.K.</creatorcontrib><title>Introduction to the IEEE Transactions on Dependable and Secure Computing</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><subject>Authentication</subject><subject>Availability</subject><subject>Context modeling</subject><subject>Cryptographic protocols</subject><subject>Cryptography</subject><subject>Fault tolerance</subject><subject>Fault tolerant systems</subject><subject>Information security</subject><subject>Intrusion detection</subject><subject>Participation</subject><subject>Robustness</subject><subject>Society</subject><subject>Software</subject><subject>Telecommunication computing</subject><subject>Trends</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2004</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNpFkL1PwzAQxS0EEqWwsbFYzKScv-J4RCHQSpUYWubISS6Qqk2C7Qz897gUielO7373nvQIuWWwYAzM4_Z5ky84gFwwOCMzZiRLAFh2HnclVaKMZpfkyvsdAJeZkTOyXPXBDc1Uh27oaRho-ES6KoqCbp3tvf3VPY23Zxyxb2y1R2r7hm6wnhzSfDiMU-j6j2ty0dq9x5u_OSfvL8U2Xybrt9dV_rROas54SCQaDqnRbSOsZbLiUAurG2BVqpWpGm006JRnQjHFGs0zjAK2UqZQG6wqMSf3J9_RDV8T-lDuhsn1MbKMxir-GRmhhxNUu8F7h205uu5g3XfJoDxWVR6rKo9VRSXidye8Q8R_VAglUyF-AHlSYsg</recordid><startdate>200401</startdate><enddate>200401</enddate><creator>Iyer, R.K.</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L6V</scope><scope>M0C</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>PYYUZ</scope><scope>Q9U</scope></search><sort><creationdate>200401</creationdate><title>Introduction to the IEEE Transactions on Dependable and Secure Computing</title><author>Iyer, R.K.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c212t-4e920697fd3aa14b20c3a7d01b6759bd7970762835151d728e970ef4460c9ebb3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Authentication</topic><topic>Availability</topic><topic>Context modeling</topic><topic>Cryptographic protocols</topic><topic>Cryptography</topic><topic>Fault tolerance</topic><topic>Fault tolerant systems</topic><topic>Information security</topic><topic>Intrusion detection</topic><topic>Participation</topic><topic>Robustness</topic><topic>Society</topic><topic>Software</topic><topic>Telecommunication computing</topic><topic>Trends</topic><toplevel>online_resources</toplevel><creatorcontrib>Iyer, R.K.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><collection>ABI/INFORM Collection China</collection><collection>ProQuest Central Basic</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Iyer, R.K.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Introduction to the IEEE Transactions on Dependable and Secure Computing</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2004-01</date><risdate>2004</risdate><volume>1</volume><issue>1</issue><spage>2</spage><epage>3</epage><pages>2-3</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><cop>Washington</cop><pub>IEEE</pub><doi>10.1109/TDSC.2004.10</doi><tpages>2</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1545-5971 |
ispartof | IEEE transactions on dependable and secure computing, 2004-01, Vol.1 (1), p.2-3 |
issn | 1545-5971 1941-0018 |
language | eng |
recordid | cdi_proquest_journals_206535194 |
source | IEEE Electronic Library (IEL) |
subjects | Authentication Availability Context modeling Cryptographic protocols Cryptography Fault tolerance Fault tolerant systems Information security Intrusion detection Participation Robustness Society Software Telecommunication computing Trends |
title | Introduction to the IEEE Transactions on Dependable and Secure Computing |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T01%3A54%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Introduction%20to%20the%20IEEE%20Transactions%20on%20Dependable%20and%20Secure%20Computing&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Iyer,%20R.K.&rft.date=2004-01&rft.volume=1&rft.issue=1&rft.spage=2&rft.epage=3&rft.pages=2-3&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2004.10&rft_dat=%3Cproquest_RIE%3E1027262881%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=206535194&rft_id=info:pmid/&rft_ieee_id=1335463&rfr_iscdi=true |