Issue No. 01 - January-March (2008 vol. 5)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TDSC.2008.9
For the past four years, it has been my privilege and pleasure to serve as the Inaugural Editor-in-Chief of IEEE's Transactions on Dependable and Secure Computing. During the relatively short time since its launch, TDSC has become the premier journal in our field.
One indicator of success is the impact factor, as measured by the IEEE. TDSC has had one of the highest impact factors among IEEE Computer Society publications, which is especially impressive considering the journal's young age. We have published nearly 100 papers in 16 issues and we have had four special sections in connection with two of the premier conferences in the field.
An outstanding group of colleagues acting as Associate Editors has helped make TDSC the success it is. Each of them has performed the task of review with great care and dedication. Further, the quality of the submissions has steadily and perceptibly increased since the journal's inception. This is due to the devotion and rigor that several hundred peer reviewers have brought to the process, thus helping the AEs hold all papers to a uniformly high standard. During the past four years, TDSC has also developed and maintained a worldwide perspective, with Associate Editors, referees, and paper submissions from Europe, Asia, and North and South America.
The number of submissions has reached approximately 190 papers per year, driven in part by the high expectations of the Associate Editors and reviewers, as well as the recognized quality of the papers published. This is particularly true of our special issues, published each year in conjunction with the IEEE International Conference on Dependable Systems and Networks (DSN) and the IEEE Symposium on Security and Privacy.
I express my heartfelt thanks to the Editorial Board, Rangachar Kasturi, the former Computer Society Vice President of Publications, Angela Burgess, the IEEE Computer Socety Executive Director, and Suzanne Wagner and Joyce Arnold of the IEEE Computer Society. To Kishor Trivedi go special thanks for his advice in the process of creating the journal. I am also deeply grateful to our many reviewers from the peer community who have worked so hard to maintain a reasonable turn-around time for the journal. My special thanks go to Heidi Leerkamp and Gerasimoula Kokkosis for their wonderful and unqualified support in helping me manage the journal and to Frances Rigberg Baker for her editorial assistance.
I extend a warm welcome to the newest Associate Editors, Zbigniew T. Kalbarczyk, Karama Kanoun, Stefan Katzenbeisser, Shubu Mukherjee, Shiuhpyng Shieh, Yervant Zorian and my sincere thanks go to our distinguished outgoing Associate Editors, Steve Bellovin and Paulo Verissimo.
My congratulations and best wishes to Virgil D. Gligor, the incoming Editor-in-Chief. I have every confidence that the journal will continue to evolve in new and exciting directions under his leadership. I am sure this young journal will continue to grow and thrive in the coming years and hope to continue my involvement as a submitter, reviewer, and reader. I end my term as its Inaugural Editor-in-Chief with great satisfaction and pride. Congratulations to all involved!
Ravishankar K. Iyer
Virgil D. Gligor received the BSc, MSc, and PhD degrees from the University of California at Berkeley. From 1976 to 2007, he taught at the University of Maryland. He is currently a professor of electrical and computer engineering at Carnegie Mellon University. Over the past three decades, his research interests ranged from access control mechanisms, penetration analysis, and denial-of-service protection to cryptographic protocols and applied cryptography. He was a consultant to Burroughs (1977-1981) and IBM (1984-1999) Corporations and is currently serving on Microsoft's Trusted Computing Academic Advisory Board (2003-present). He served the profession as the chair or cochair of several international conferences and symposia including the IEEE Security and Privacy Symposium, the Internet Society's Network and Distributed Systems Security Symposium, IEEE Dependable Computing for Critical Applications, and the IEEE-ACM Symposium on Reliability in Distributed Software and Databases. He received the outstanding paper award at the 1988 IEEE Symposium on Security and Privacy and the best paper award at the 13th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (2004). He was a member of several US Government INFOSEC Study Groups that set research agendas in information security and served on a National Research Council panel on information security (1987-1988). He has published more than 100 technical articles and was awarded six patents. Dr. Gligor was an editorial board member of Information Systems (1984-1993), Journal of Computer Security (1991-2000), ACM Transactions on Information System Security (2001-2008), IEEE Transactions on Dependable and Secure Computing (2004-2007), IEEE Transactions on Computers (2005-2007), and IEEE Transactions on Mobile Computing (2007). In 2005, he was elected chair of the ACM's Special Interest Group on Security, Audit and Control, and received the National Information Systems Security Award given by NIST and NSA in the US.
Zbigniew T. Kalbarczyk received the PhD degree in computer science from the Technical University of Sofia, Bulgaria. He is currently a research professor at the Center for Reliable and High-Performance Computing in the Coordinated Science Laboratory of the University of Illinois at Urbana-Champaign. Before joining the University of Illinois, he worked as an assistant professor in the Laboratory for Dependable Computing at Chalmers University of Technology in Gothenburg, Sweden. Dr. Kalbarczyk's research interests are in the area of reliable and secure networked systems. His current work focuses on development of techniques and tools for providing application-aware reliability and security, where the goal is to customize the mechanisms for detecting security attacks and execution errors using knowledge about the expected or allowed program/system behavior. His research also involves development of automated techniques for validation and benchmarking of dependable and secure computing systems. He has published more than 90 technical papers in peer-reviewed journals and international conferences. He was the program chair of the Dependable Computing and Communication Symposium (DCCS) 2007 and the program cochair of the Computer Performance and Dependability Symposium (PDS) 2002. (DCCS and PDS are tracks of the International Conference on Dependable Systems and Networks.) He is regularly invited to serve on the program committees of several international conferences on dependability and security of computing systems. He is a member of the IEEE and the IEEE Computer Society.Karama Kanoun received the Certified Engineer degree from the National School of Civil Aviation, Toulouse, and the Doctor-Engineer and the Doctor-ès-Science degrees from the National Polytechnique Institute, Toulouse. She was a visiting professor at the University of Illinois, Urbana-Champaign, during the first semester of 1998. She is Directeur de Recherche at LAAS-CNRS. Her research interests include modeling and evaluation of computer system dependability considering hardware as well as software and dependability benchmarking. She has authored or coauthored more than 150 conference and journal papers, five books, and 10 book chapters. She has codirected the production of a book on dependability benchmarking, accepted for publication by the IEEE Computer Society, to appear in 2008. She is vice-chairperson of the IFIP working group 10.4 on Dependable Computing and Fault Tolerance. She is chairperson of 1) the Special Interest Group on Dependability Benchmarking of the IFIP working group 10.4, 2) the French SEE Technical Committee on Trustworthy Computer Systems, and 3) the SEE Working Group "Design and Validation for Dependability." She was the principal investigator of the DBench European project (Dependability Benchmarking). DBench has been selected as part of ICT Results (an editorial service offering news and views on innovations, emerging from EU-funded research in information and communications technology; only a few distinguished projects have a Web page on ICT Results). She is responsible of the integration and management of the ReSIST European Network of Excellence (Resilience for Survivability in Information Society Technologies). She has been a consultant for several French companies, the European Space Agency, Ansaldo Transporti, and for the International Union of Telecommunications. She has been involved in more than 20 national research contracts (with Aerospatiale, Bull, EADS, EDF, CNES, CENA) and European projects (among which CRUTIAL and HiDENETS that are currently running). She is a member of the steering committees of the three main conferences in her field of interest: ISSRE (IEEE International Symposium on Software Reliability Engineering), DSN (IEEE International Conference on Dependable Systems and Networks), and EDCC (European Dependable Computing Conference). Since 2000, she has been a member of the Advisory Committee to the International Conference on Quality Reliability and IT, organized by the Indian Institute of Technology. She has served as program committee cochair of the 28th Annual International Computer Software and Application Conference (COMPSAC '04), Hong Kong, the International Conference on Dependable Systems and Networks (DSN '00), New York, the Fifth IEEE International Symposium on Software Reliability Engineering (ISSRE '94), Monterey, California, and the Fourth European Workshop on Dependable Computing (EWDC '92), Prague, Czechoslovakia. She has served as general chair of the 18th International Conference on Computer Safety, reliability and Security (Safecomp '99), Toulouse, the Sixth IEEE International Symposium on Software Reliability Engineering, Toulouse, 1995, and the Second International Conference on Reliability, Maintainability and Safety, Beijing, China, 1994. She has served several times on the Program Committees of FTCS and IPDS (which were grouped together into DSN in 2000), HASE, ICCCN, ISSRE, COMPSAC, PNPM, Safecomp conferences, and the French Congress on Risk Management and Dependability. She also acts as a referee for several international conferences and journals. She is a member of the editorial board of the IEEE Transactions on Software Engineering and of the International Journal of Performability Engineering. She was an associate editor of the IEEE Transactions on Reliability (1999-2004).Stefan Katzenbeisser received the PhD degree from the Vienna University of Technology, Austria. After working as a research scientist at the Technical University in Munich, Germany, he joined Philips Research as a senior scientist in 2006. Since April 2008, he has been an assistant professor at the Darmstadt University of Technology, heading the Security Engineering group. His current research interests include digital rights management, security aspects of digital watermarking, data privacy, software security, and cryptographic protocol design. He has authored more than 40 scientific publications and served on the program committees of several workshops and conferences devoted to watermarking and applied cryptography. Among others, he was the program chair of the Information Hiding Workshop '05, the IFIP Communications and Multimedia Security Conference '05 and the International Workshop on Digital Watermarking '07. Currently, he is an associate editor of the EURASIP Journal on Information Security. He is a member of the IEEE, ACM, and IACR.
Shubu Mukherjee received the BTech degree from the Indian Institute of Technology, Kanpur, and the MS and PhD degrees from the University of Wisconsin-Madison. He is a principal engineer and director of Intel's SPEARS Group (Simulation and Pathfinding of Efficient and Reliable Systems). The SPEARS Group is responsible for spearheading architectural change and innovation in the delivery of enterprise processors and chipsets by building and supporting simulation and analytical models of performance, power, and reliability. Dr. Mukherjee is widely recognized both within and outside Intel as one of the experts on architecture design for soft errors. He has made pioneering contributions toward the design of Redundant Multithreading (RMT) techniques, architectural vulnerability modeling for soft errors, creation of performance modeling infrastructure called Asim (jointly with Dr. Joel Emer), design of the Alpha 21364 interconnection network, and the creation of the first shared memory prediction scheme. Prior to joining Intel, he worked at Compaq for three years and Digital Equipment Corporation for 10 days. He was the general chair of ASPLOS (Architectural Support for Programming Languages and Operating Systems), 2004. He has coauthored more than 45 publications and holds 10 patents, with more than 30 more filed. Dr. Mukherjee's recent book on Architecture Design for Soft Errors, under contract with Morgan-Kaufmann, is coming out in February 2008. He is vice chair of Intel's SER Tech Council and a member of Intel's architecture patent committee.
Shiuhpyng Shieh received the MS and PhD degrees in electrical and computer engineering from the University of Maryland, College Park, respectively. He is a professor in the Department of Computer Science, National Chiao Tung University (NCTU), and the director of the Taiwan Information Security Center at NCTU. He served in the past as the Computer Science Department Chair of NCTU, director of GSN-CERT/CC, advisor to the National Information and Communication Security Task Force, and advisor to the National Security Bureau. Dr. Shieh currently serves as the chair of the IEEE Reliability Society Taipei and Tainan Chapter and is a steering committee member of ACM SIGSAC. He is also an associate editor of the ACM Transactions on Information and System Security, Journal of Computer Security, the former editor of the Journal of Information Science and Engineering, and a guest editor of EEE Internet Computing. He is the former president of the Chinese Cryptology and Information Security Association (CCISA), which is similar to IACR in the US. He was on the organizing committees of numerous conferences, such as the steering committee chair of the ACM Symposium on Information, Computer, and Communications Security. Dr. Shieh has published more than 100 academic articles, including papers, patents, and books. Recently, he received the ACM Service Award for his contribution to ACM and the Distinguished Information Technology Award for his contribution to computer security research. His research interests include network and system security, wireless security, and cryptography.
Yervant Zorian received the MS degree from the University of Southern California and the PhD degree from McGill University. He is the vice president and chief scientist of Virage Logic Corp. Previously, he was a distinguished member of the technical staff at AT&T Bell Laboratories and the chief technology advisor of LogicVision Inc. He is an adjunct professor at the University of British Columbia. He served as the IEEE Computer Society Vice President for Conferences and Tutorials and the President of the IEEE Test Technology Technical Council. He also serves as the Editor-in-Chief Emeritus of IEEE Design and Test of Computers and associate editor of the Journal on Electronic Testing: Theory and Applications ( JETTA). He founded and chairs the IEEE 1500 embedded core test standardization working group and currently serves on the Board of Governors of CEDA and the steering committees of several major design and test conferences including DAC, ITC, DATE, VTS, ETS, and IOLTS. He has authored more than 300 scientific papers, four books, holds 18 US patents, and received numerous best paper awards and Bell Labs' R&D Achievement Award. A fellow of the IEEE, he was selected by EE Times among the top 13 influencers on the semiconductor industry. Dr. Zorian was the 2005 recipient of the prestigious IEEE Industrial Pioneer Award and 2006 IEEE Hans Karlsson Award.
For information on obtaining reprints of this article, please send e-mail to: firstname.lastname@example.org.