{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T01:31:03Z","timestamp":1769736663429,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540001065","type":"print"},{"value":"9783540361244","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36124-3_49","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T17:37:10Z","timestamp":1196703430000},"page":"723-736","source":"Crossref","is-referenced-by-count":4,"title":["Implementing a CORBA-Based Architecture for Leveraging the Security Level of Existing Applications"],"prefix":"10.1007","author":[{"given":"D.","family":"Cotroneo","sequence":"first","affiliation":[]},{"given":"A.","family":"Mazzeo","sequence":"additional","affiliation":[]},{"given":"L.","family":"Romano","sequence":"additional","affiliation":[]},{"given":"S.","family":"Russo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,11,5]]},"reference":[{"key":"49_CR1","doi-asserted-by":"crossref","unstructured":"Y. Deswarte, K. Kanoun, and J. C. Laprie, \u201cDiversity against Accidental and Deliberate faults\u201d, in Computer Security, Dependability, and Assurance, P. Amman, B.H. Barnes, S. Jajodia, E.H. Sibley, eds, IEEE Computer Society Press, 1999","DOI":"10.1109\/CSDA.1998.798364"},{"key":"49_CR2","unstructured":"D. Atkins, et al., \u201cInternet Security Professional Reference\u201d. 2nd edn. New Riders Publishing, Indianapolis, 1997"},{"key":"49_CR3","doi-asserted-by":"crossref","unstructured":"J. C. Laprie, \u201cDependable Computing and Fault Tolerance: Concepts and Terminology\u201d, in Proc. of 15th International Symposium on Fault Tolerant Computing, IEEE Computer Society,, pp. 2\u201311, Ann Arbor, MI, 1985.","DOI":"10.1109\/FTCSH.1995.532603"},{"key":"49_CR4","doi-asserted-by":"crossref","unstructured":"Z.T. Kalbarczyk, S. Bagchi, K. Whisnant, and R.K. Iyer, \u201cChameleon: A software Infrastructure for Adaptive Fault Tolerance\u201d, in IEEE Transactions on Parallel and Distributed Systems, vol.10, no.6, June 1999.","DOI":"10.1109\/71.774907"},{"key":"49_CR5","doi-asserted-by":"crossref","unstructured":"L.E. Moser, P.M. Melliar-Smith, P. Narasimhan, L. Tewksbury and V. Kalogeraki, \u201cThe Eternal System: An Architecture for Enterprise Applications\u201d, in Proc. of International Enterprise Distributed Object Computing Conference,University of Mannheim, Germany (September 1999), pp. 214\u2013222","DOI":"10.1109\/EDOC.1999.792065"},{"key":"49_CR6","doi-asserted-by":"crossref","unstructured":"K.K. Goswami, R.K. Iyer, \u201cSimulation of Software Behavior Under Hardware Faults\u201d, in Proc. of the 23rd Annual International Symposium on Fault-Tolerant Computing, Toulouse, France, June 1993.","DOI":"10.1109\/FTCS.1993.627325"},{"key":"49_CR7","unstructured":"John D. Howard, An Analysis of Security Incidents on the Internet 1989-1995, Apr. 1997, Pittsburgh, Pennsylvania, USA. http:\/\/www.cert.org\/research\/JHThesis\/Start.html"},{"key":"49_CR8","first-page":"141","volume":"7","author":"R. Han","year":"1999","unstructured":"R. Han, D. Messerschmitt, A progressively reliable transport protocol for interactive wireless multimedia, in Multimedia Systems 7: pp. 141\u2013156, 1999","journal-title":"A progressively reliable transport protocol for interactive wireless multimedia, in Multimedia Systems"},{"key":"49_CR9","doi-asserted-by":"crossref","unstructured":"M. Cukier et al., \u201cAQuA: An Adaptive Architecture that Provides Dependable Distributed Objects\u201d, in Proc. of the 17th IEEE Symposium on Reliable Distributed Systems (SRDS\u201998),West Lafayette, Indiana, USA, October 23, 1998, pp. 245\u2013253.","DOI":"10.1109\/RELDIS.1998.740506"},{"issue":"3","key":"49_CR10","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1088\/0967-1846\/4\/3\/003","volume":"4","author":"P. Narasimhan","year":"1997","unstructured":"P. Narasimhan, L. E. Moser, P.M. Melliar-Smith, \u201cReplica Consistency of Objects in Partitionable Distributed Systems\u201d, in Distributed Systems Engineering, vol.4, no.3, September 1997, pp. 139\u2013150.","journal-title":"Distributed Systems Engineering"},{"key":"49_CR11","doi-asserted-by":"crossref","unstructured":"J.C. Fabre and T. P\u00e8rennou, \u201cA Metaobject Architecture for Fault-Tolerant Distributed Systems: The FRIENDS Approach\u201d,in IEEE Transactions on Computers, vol. 47, no. 1, January 1998.","DOI":"10.1109\/12.656088"},{"key":"49_CR12","doi-asserted-by":"crossref","unstructured":"P. Felber, R. Guerraoui, A. Schiper, \u201cThe Implementation of a Object Group Service\u201d, in Theory and Practice of Object Systems (TAPOS),Wiley&Sons, Vol. 4, No. 2, 1998.","DOI":"10.1002\/(SICI)1096-9942(1998)4:2<93::AID-TAPO4>3.0.CO;2-8"},{"key":"49_CR13","unstructured":"Ken Birman, Robert Constable, Mark Hayden, Christopher Kreitz, Ohad Rodeh, Robbert van Renesse, Werner Vogels,The Horus and Ensemble Projects: Accomplishments and Limitations, in Proceedings of the DARPA Information Survivability Conference & Exposition (DISCEX\u2019 00), January 25-27 2000 in Hilton Head, South Carolina"},{"key":"49_CR14","doi-asserted-by":"crossref","unstructured":"D.E. Bakken, Z. Zhan, C.C. Jones, D.A. Karr, Middleware Support for Voting and Data Fusion, in: The 2001 International Conference on Dependable Systems and Networks, IEEE-CS, 2001, pp. 453\u2013462.","DOI":"10.1109\/DSN.2001.941429"},{"key":"49_CR15","unstructured":"Institute for Applied Information Processing and Communications, March 2001 http:\/\/jcewww.iaik.tu-graz.ac.at\/jce\/jce.htm ."},{"key":"49_CR16","unstructured":"IONA Technologies PLC, \u201cOrbix 2000 SSL\/TLS Programmer\u2019s Guide\u201d. December 2000 available on http:\/\/www.iona.com ."},{"key":"49_CR17","doi-asserted-by":"crossref","unstructured":"R. Housley, W. Ford, W. Polk, D. Solo, Internet X.509 Public Key Infrastructure Certificate and CRL Profile, RFC 2459, January 1999.","DOI":"10.17487\/rfc2459"},{"key":"49_CR18","unstructured":"IONA Technologies PLC, \u201cOrbix 2000 Programmer\u2019s Guide Java Edition\u201d. December 2000 available on http:\/\/www.iona.com ."},{"key":"49_CR19","unstructured":"National Institute of Standards and Technology: Secure Hash Standard, FIPS PUB 180-1, Federal Information Processing Standards Pubblication, 1995 (available online at http:\/\/www.itl.nist.gov\/.pspubs\/.ps180-1.htm )"},{"key":"49_CR20","doi-asserted-by":"crossref","unstructured":"R. Rivest, The MD5 Message-Digest Algorithm, RFC 1321, MIT LCS & RSA Data Security Inc., April 1992.","DOI":"10.17487\/rfc1321"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems 2002: CoopIS, DOA, and ODBASE"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36124-3_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T05:25:41Z","timestamp":1737609941000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36124-3_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540001065","9783540361244"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-36124-3_49","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}