{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:44:02Z","timestamp":1742402642708,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540000129"},{"type":"electronic","value":"9783540360803"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36080-8_21","type":"book-chapter","created":{"date-parts":[[2010,3,29]],"date-time":"2010-03-29T21:55:19Z","timestamp":1269899719000},"page":"234-252","source":"Crossref","is-referenced-by-count":21,"title":["The Design of a COTS Real-Time Distributed Security Kernel"],"prefix":"10.1007","author":[{"given":"Miguel","family":"Correia","sequence":"first","affiliation":[]},{"given":"Paulo","family":"Ver\u00edssimo","sequence":"additional","affiliation":[]},{"given":"Nuno Ferreira","family":"Neves","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,11,8]]},"reference":[{"key":"21_CR1","unstructured":"Linux Capabilities FAQ 0.2. ftp:\/\/ftp.guardian.no\/pub\/free\/linux\/capabilities\/ capfaq.txt , 2000."},{"issue":"7","key":"21_CR2","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MC.1983.1654439","volume":"16","author":"S. Ames","year":"1983","unstructured":"S. Ames, M. Gasser Jr., and R. Schell. Security kernel design and implementation: An introduction. IEEE Computer, 16(7):14\u201322, 1983.","journal-title":"IEEE Computer"},{"key":"21_CR3","unstructured":"M. Barabanov. A Linux-based real-time operating system. Master\u2019s thesis, New Mexico Institute of Mining and Technology, June 1997."},{"key":"21_CR4","unstructured":"M. Correia, L. C. Lung, N. F. Neves, and P. Ver\u00edssimo. Efficient byzantine-resilient reliable multicast on a hybrid failure model. In Proc. of the 21th IEEE Symposium on Reliable Distributed Systems, October 2002."},{"key":"21_CR5","unstructured":"M. Correia, P. Ver\u00edssimo, and N. F. Neves. The design of a COTS real-time distributed security kernel (extended version). DI\/FCUL TR 01-12, Department of Computer Science, University of Lisbon, 2001."},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"D. Eastlake, S. Crocker, and J. Schiller. Randomness recommendations for security. IETF Network Working Group, Request for Comments 1750, December 1994.","DOI":"10.17487\/rfc1750"},{"key":"21_CR7","unstructured":"N. Itoi and P. Honeyman. Smartcard integration with Kerberos v5. In Proc. of the USENIX Workshop on Smartcard Technology, May 1999."},{"issue":"1","key":"21_CR8","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/775265.775268","volume":"8","author":"B. Lampson","year":"1974","unstructured":"B. Lampson. Protection. Operating Systems Review, 8(1):18\u201324, 1974.","journal-title":"Operating Systems Review"},{"key":"21_CR9","unstructured":"A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997."},{"key":"21_CR10","unstructured":"F. Meyer and D. Pradhan. Consensus with dual failure modes. In Proc. of the 17th IEEE International Symposium on Fault-Tolerant Computing, July 1987."},{"key":"21_CR11","unstructured":"National Computer Security Center. Trusted computer systems evaluation criteria, August 1983."},{"key":"21_CR12","unstructured":"National Computer Security Center. Trusted network interpretation of the trusted computer system evaluation criteria, July 1987."},{"key":"21_CR13","unstructured":"N. F. Neves and P. Ver\u03afssimo, editors. First Specification of APIs and Protocols for MAFTIA Middleware. Project MAFTIA IST-1999-11583 deliverable D24. August 2001. http:\/\/www.research.ec.org\/maftia\/deliverables\/d24final.pdf ."},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"D. Powell, editor. Delta-4-A Generic Architecture for Dependable Distributed Computing. ESPRIT Research Reports. Springer-Verlag, November 1991.","DOI":"10.1007\/978-3-642-84696-0"},{"key":"21_CR15","unstructured":"D. Powell and R. J. Stroud, editors. MAFTIA: Conceptual Model and Architecture. Project MAFTIA IST-1999-11583 deliverable D2. November 2001. http:\/\/www.research.ec.org\/maftia\/deliverables\/D2fin.pdf ."},{"key":"21_CR16","unstructured":"T. Stabell-Kul\u00f8, R. Arild, and P. H. Myrvang. Providing authentication to messages signed with a smart card in hostile environments. In Proc. of the USENIX Workshop on Smartcard Technology, May 1999."},{"key":"21_CR17","unstructured":"Trusted Computing Platform Alliance (TCPA). Main specification version 1.1a. Technical report, TCPA, December 2001. http:\/\/www.trustedpc.org\/ ."},{"key":"21_CR18","unstructured":"J. D. Tygar and B. S. Yee. Dyad: A system for using physically secure coprocessors. In Workshop on Technological Strategies for the Protection of Intellectual Property in the Network Multimedia Environment, April 1993."},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"P. Ver\u03afssimo, A. Casimiro, and C. Fetzer. The Timely Computing Base: Timely actions in the presence of uncertain timeliness. In Proc. of the International Conference on Dependable Systems and Networks, pages 533\u2013542, June 2000.","DOI":"10.1109\/ICDSN.2000.857587"},{"key":"21_CR20","unstructured":"P. Ver\u03afssimo, N. F. Neves, and M. Correia. The middleware architecture of MAFTIA: A blueprint. In Proc. of the IEEE Third Information Survivability Workshop, October 2000."},{"issue":"3","key":"21_CR21","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1023\/A:1007949113722","volume":"12","author":"P. Ver\u03afssimo","year":"1997","unstructured":"P. Ver\u03afssimo, L. Rodrigues, and A. Casimiro. Cesiumspray: a precise and accurate global clock service for large-scale systems. Journal of Real-Time Systems, 12(3):243\u2013294, 1997.","journal-title":"Journal of Real-Time Systems"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"C. Walter, N. Suri, and M. Hugue. Continual on-line diagnosis of hybrid faults. In Proc. of the 4th IFIP International Working Conference on Dependable Computing for Critical Applications, 1994.","DOI":"10.1007\/978-3-7091-9396-9_21"}],"container-title":["Lecture Notes in Computer Science","Dependable Computing EDCC-4"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36080-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T19:25:49Z","timestamp":1739993149000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36080-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540000129","9783540360803"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-36080-8_21","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}