Username   Password       Forgot your password?  Forgot your username? 

ISSUES BY YEAR

Volume 13 - 2017

No.4 July 2017
No.4 July 2017
No.5 September 2017
No.5 September 2017

Volume 12 - 2016

Volume 11 - 2015

Volume 10 - 2014

Volume 9 - 2013

Volume 8 - 2012

Volume 7 - 2011

Volume 6 - 2010

Volume 5 - 2009

Volume 4 - 2008

Volume 3 - 2007

Volume 2 - 2006

Back to Short Communications

Information Security from Survivability Assessment Perspective

SC IJPE 04

Li Bai, Saroj Biswas, and Henry Sendaula

ECE, College of Engineering, Temple University, Philadelphia, PA 19122, U.S.A.

Received on: April 12, 2007

 

Abstract:

In this paper, we investigate an important and interesting problem in a dependable secure computing system. The problem is to determine an optimal time that the secret shares should be updated on a (k, n) threshold-based secret sharing system with the proactive secret sharing (PSS) capability. In an earlier survivability study for a reconfigurable system, we developed a new definition for the survivability assessment. We extend this new definition for the survivability of the dependable secure computing system. From the survivability assessment perspective, we can easily determine an appropriate updating time for safeguarding secret information on the dependable secure computing system.

 

Status: Published in Vol. 3, No 3, July 2007. pp. 379-381

 

Important Access Information

Individuals, Institutions and Corporations with access via userid and password:

If you have a valid userid and password, you will need to login at the top of the screen. All volumes that are authorized by your subscription will be available for download. If you are not authorized, you will see an 'add to cart' option and you have the choice of purchasing the articles. You may also apply for subscription from our Subscription page.

 

If you cannot access any paper and you feel your subscription entitles you to access, please notify us by using the contact form on the Contact Us page. Please provide as much detail as possible.

 

Institutions and Corporations with access via IP addresses:

If you have a subscription via IP addresses, all volumes that are authorized by your subscription will be available for download. If you are not authorized, you will see an 'add to cart' option and you have the choice of purchasing the articles. You may also apply for subscription from our Subscription page.

 

If you cannot access any paper and you feel your subscription entitles you to access, please verify that the EXTERNAL IP address of your computer is authorized. Before contacting us, contact your system administrator and confirm if the IP address of your network has been authorized for access. To find out the EXTERNAL IP address of your network, simply open any Internet browser and point it to : http://www.WhatIsMyIP.com. Your EXTERNAL IP address will be shown in the browser window.

 

Once you have this information, you may email us using the contact form on the Contact Us page. Please provide as much detail as possible. You may also email a screenshot of the browser to :subscriptions@IJPE-Online.com

 

Thank you for your understanding. We will try our best to reply within 24-48 hours.

This site uses encryption for transmitting your passwords. ratmilwebsolutions.com