{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T13:12:10Z","timestamp":1773148330131,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540446019","type":"print"},{"value":"9783540446057","type":"electronic"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11863908_14","type":"book-chapter","created":{"date-parts":[[2006,9,16]],"date-time":"2006-09-16T03:28:46Z","timestamp":1158377326000},"page":"207-224","source":"Crossref","is-referenced-by-count":16,"title":["Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System"],"prefix":"10.1007","author":[{"given":"Hai","family":"Wang","sequence":"first","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","volume-title":"Probability and statistics with reliability, queuing and computer science applications","author":"K.S. Trivedi","year":"2002","unstructured":"Trivedi, K.S.: Probability and statistics with reliability, queuing and computer science applications. John Wiley and Sons Ltd., Chichester (2002)"},{"key":"14_CR2","unstructured":"Liu, P.: Architectures for intrusion tolerant database systems. In: Proceedings of 18th Annual Computer Security Applications Conference (ACSAC 2002), pp. 311\u2013320 (2002)"},{"issue":"3","key":"14_CR3","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1023\/B:JIIS.0000047394.02444.8d","volume":"23","author":"P. Liu","year":"2004","unstructured":"Liu, P., Jing, J., Luenam, P., Wang, Y., Li, L., Ingsriswang, S.: The design and implementation of a self-healing database system. Journal of Intelligent Information Systems (JIIS)\u00a023(3), 247\u2013269 (2004)","journal-title":"Journal of Intelligent Information Systems (JIIS)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Yu, M., Liu, P., Zang, W.: Self-healing workflow systems under attacks. In: Proceedings of 24th International Conference on Distributed Computing Systems (ICDCS 2004), pp. 418\u20134025 (2004)","DOI":"10.1109\/ICDCS.2004.1281607"},{"issue":"1\u20134","key":"14_CR5","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.peva.2003.07.008","volume":"56","author":"B.B. Madan","year":"2004","unstructured":"Madan, B.B., Goseva-Popstojanova, K., Vaidyanathan, K., Trivedi, K.S.: A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation\u00a056(1\u20134), 167\u2013186 (2004)","journal-title":"Performance Evaluation"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Lippmann, R., Fried, D., Graf, I., Haines, J., Kendall, K., McClung, D., Weber, D., Webster, S., Wyschogrod, D., Cunningham, R., Zissman, M.: Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In: Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX), pp. 12\u201326 (2000)","DOI":"10.1109\/DISCEX.2000.821506"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Hu, Y., Panda, B.: A data mining approach for database intrusion detection. In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), pp. 711\u2013716 (2004)","DOI":"10.1145\/967900.968048"},{"issue":"1","key":"14_CR8","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/12.980014","volume":"51","author":"W. Chen","year":"2002","unstructured":"Chen, W., Toueg, S., Aguilera, M.K.: On the quality of service of failure detectors. IEEE Transactions on Computers\u00a051(1), 13\u201332 (2002)","journal-title":"IEEE Transactions on Computers"},{"issue":"6","key":"14_CR9","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/4236.807008","volume":"3","author":"R.J. Ellison","year":"1999","unstructured":"Ellison, R.J., Fisher, D.A., Linger, R.C., Lipson, H.F., Longstaff, T.A., Mead, N.R.: Survivability: Protecting your critical systems. IEEE Internet Computing\u00a03(6), 55\u201363 (1999)","journal-title":"IEEE Internet Computing"},{"key":"14_CR10","unstructured":"TPC: Tpc-c benchmark (2004), http:\/\/www.tpc.org\/tpcc\/"},{"key":"14_CR11","unstructured":"Knight, J.C., Strunk, E.A., Sullivan, K.J.: Towards a rigorous definition of information system survivability \u00a01, 78\u201389 (2003)"},{"issue":"3","key":"14_CR12","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1145\/356850.356852","volume":"13","author":"C.E. Landwehr","year":"1981","unstructured":"Landwehr, C.E.: Formal models for computer security. ACM Computing Surveys\u00a013(3), 247\u2013278 (1981)","journal-title":"ACM Computing Surveys"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Singh, S., Cukier, M., Sanders, W.H.: Probabilistic validation of an intrusion-tolerant replication system. In: Proceedings of the International Conference on Dependable Systems and Networks (DSN 2003), pp. 615\u2013624 (2003)","DOI":"10.1109\/DSN.2003.1209971"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, J., Liu, P.: Delivering services with integrity guarantees in survivable database systems. In: Proceedings of the 17th Annual Working Conference on Data and Application Security, pp. 33\u201346 (2003)","DOI":"10.1007\/1-4020-8070-0_3"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-540-30144-8_13","volume-title":"Information Security","author":"H. Wang","year":"2004","unstructured":"Wang, H., Liu, P., Li, L.: Evaluating the impact of intrusion detection deficiencies on the cost-effectiveness of attack recovery. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.\u00a03225, pp. 146\u2013157. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2006"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11863908_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T21:47:21Z","timestamp":1736545641000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11863908_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540446019","9783540446057"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11863908_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}