{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T05:23:30Z","timestamp":1736054610538,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540297697"},{"type":"electronic","value":"9783540321002"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11576235_72","type":"book-chapter","created":{"date-parts":[[2005,10,18]],"date-time":"2005-10-18T15:32:46Z","timestamp":1129649566000},"page":"713-724","source":"Crossref","is-referenced-by-count":2,"title":["A Holistic Approach to Survivable Distributed Information System for Critical Applications"],"prefix":"10.1007","author":[{"given":"H. Q.","family":"Wang","sequence":"first","affiliation":[]},{"given":"D. X.","family":"Liu","sequence":"additional","affiliation":[]},{"given":"D.","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Y. Y.","family":"Lan","sequence":"additional","affiliation":[]},{"given":"X. Y.","family":"Li","sequence":"additional","affiliation":[]},{"given":"Q.","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"72_CR1","first-page":"328","volume-title":"Proceedings 14th National Computer Security Conference","author":"J. McCumber","year":"1991","unstructured":"McCumber, J.: Information Systems Security: A Comprehensive Model. In: Proceedings 14th National Computer Security Conference, pp. 328\u2013337. National Institute of Standards and Technology, Baltimore (1991)"},{"key":"72_CR2","first-page":"306","volume-title":"Proc. of the 2001 IEEE Workshop on Information Assurance and Security","author":"M. Victor","year":"2001","unstructured":"Victor, M., Schou, C., Ragsdale, D., et al.: A Model for Information Assurance: An Integrated Approach. In: Proc. of the 2001 IEEE Workshop on Information Assurance and Security, pp. 306\u2013310. U.S. Military Academy, West Point (2001)"},{"key":"72_CR3","volume-title":"Proc. of the 2002 IEEE Workshop on Information Assurance","author":"W. Yurcik","year":"2002","unstructured":"Yurcik, W., Doss, D.: A Survivability-Over-Security (SOS) Approach to Holistic Cyber-Ecosystem Assurance. In: Proc. of the 2002 IEEE Workshop on Information Assurance. United States Military Academy, West Point (2002)"},{"key":"72_CR4","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1109\/MCOM.2002.1018017","volume":"6","author":"S.V. Kartalopoulos","year":"2002","unstructured":"Kartalopoulos, S.V.: Surviving a Disaster. IEEE Comm. Mag.\u00a06, 124\u2013126 (2002)","journal-title":"IEEE Comm. Mag."},{"key":"72_CR5","unstructured":"Voas, J., McGraw, G., Ghosh, A.: Reducing uncertainty about survivability. In: Proceedings of the 1997 Information Survivability Workshop (1997)"},{"issue":"2","key":"72_CR6","first-page":"64","volume":"21","author":"H.Q. Wang","year":"1996","unstructured":"Wang, H.Q.: An Approach to Designing and Implementing Function Back-up, Reconfiguration and Recovery for Distributed Fir Control System on Warship. Fire Control & Command Control\u00a021(2), 64\u201368 (1996) (in Chinese)","journal-title":"Fire Control & Command Control"},{"key":"72_CR7","unstructured":"Wang, H.Q.: Research on a Full Distributed Redundant Disk System. In: Proc. of 1997 IEEE ICIPS, Beijing (1997)"},{"key":"72_CR8","unstructured":"Wang, H.Q.: A Parallel and Fault-tolerant LAN with Dual Communication Subnetworks. In: Proc. of pAs 1997, Fukushima\/JAPAN, IEEE Comp. Soc. Press (1997)"},{"issue":"4","key":"72_CR9","first-page":"58","volume":"19","author":"H.Q. Wang","year":"1997","unstructured":"Wang, H.Q.: Distributed Redundant Disks: A new Approach to Reliably Sharing Network-based Storage System. System Eng\u2019r and Electronics\u00a019(4), 58\u201361 (1997) (in Chinese)","journal-title":"System Eng\u2019r and Electronics"},{"issue":"8","key":"72_CR10","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/2.863969","volume":"33","author":"J. Wylie","year":"2000","unstructured":"Wylie, J., Bigrigg, M., Strunk, J., et al.: Survivable Information Storage Systems. IEEE Computer\u00a033(8), 61\u201368 (2000)","journal-title":"IEEE Computer"},{"key":"72_CR11","unstructured":"Millen June, J.K.: Survivability Measure (2000), http:\/\/www.csl.sri.com\/users\/millen\/papers\/measure.ps"},{"key":"72_CR12","doi-asserted-by":"crossref","unstructured":"Keromytis, A.D., Parekh, J., Gross, P.N., et al.: A Holistic Approach to Service Survivability. In: Proc. of the ACM Survivable and Self-Regenerative Systems Workshop, pp. 11\u201322 (2003)","DOI":"10.1145\/1036921.1036923"},{"key":"72_CR13","volume-title":"Proc. of DISCEX 2000","author":"D. Medhi","year":"2000","unstructured":"Medhi, D., Tipper, D.: Multi-Layered Network Survivability \u2013 Models, Analysis, Architecture, Framework and Implementation\u2013An Overview. In: Proc. of DISCEX 2000. IEEE Computer Society Press, Hilton Head (2000)"},{"key":"72_CR14","doi-asserted-by":"crossref","unstructured":"Bowen, T., Chee, D., Segal, M., et al.: Building Survivable Systems: An Integrated Approach Based on Intrusion Detection and Damage Containment. In: Proc. of DISCEX 2000, Hilton Head Island, South Carolina, vol.\u00a02, pp. 84\u201399 (2000)","DOI":"10.1109\/DISCEX.2000.821511"},{"key":"72_CR15","doi-asserted-by":"crossref","unstructured":"Ellison, E., Linger, L., Longstaff, M.: Survivable Network Systems: An Emerging Discipline. Technical Report CMU\/SEI-97-TR-013, Carnegie Mellon University, Pittsburgh (1997)","DOI":"10.21236\/ADA341963"},{"key":"72_CR16","volume-title":"IEEE Proceedings of the Hawaii International Conference on Systems Sciences","author":"D. Fisher","year":"1999","unstructured":"Fisher, D.: Emergent Algorithms: A New Method for Enhancing Survivability in Unbounded Systems. In: IEEE Proceedings of the Hawaii International Conference on Systems Sciences. IEEE Computer Society Press, New York (1999)"},{"key":"72_CR17","unstructured":"Knight, J., Lubinsky, R., McHugh, J., et al.: Architectural Approaches to Information Survivability. Technical Report: CS-97-25, University of Virginia,Charlottesville (1997)"},{"key":"72_CR18","unstructured":"Knight, J., et al.: Topics in Survivable Systems. Computer Science Report. No. CS-98-22, University of Virginia (1998)"},{"key":"72_CR19","doi-asserted-by":"crossref","unstructured":"Neumann, P.: Practical Architectures for Survivable Systems and Networks (Phase-Two Final Report). Computer Science Laboratory, SRI International (2000)","DOI":"10.21236\/ADA368944"},{"key":"72_CR20","doi-asserted-by":"crossref","unstructured":"Knight, J.C., Sullivan, K.J., Elder, M.C., et al.: Survivability Architectures: Issues and Approaches. In: DISCEX 2000, Hilton Head, South Carolina, vol.\u00a02, pp. 1157\u20131171 (2000)","DOI":"10.21236\/ADA465737"},{"issue":"1","key":"72_CR21","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1147\/sj.421.0005","volume":"42","author":"A.G. Ganek","year":"2003","unstructured":"Ganek, A.G., Corbi, T.A.: The dawning of the autonomic computing. IBM Systems Journal\u00a042(1), 5\u201318 (2003)","journal-title":"IBM Systems Journal"}],"container-title":["Lecture Notes in Computer Science","Parallel and Distributed Processing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11576235_72.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T00:51:47Z","timestamp":1736038307000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11576235_72"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540297697","9783540321002"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11576235_72","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}