{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:44:57Z","timestamp":1725489897471},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401612"},{"type":"electronic","value":"9783540448433"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44843-8_34","type":"book-chapter","created":{"date-parts":[[2007,8,15]],"date-time":"2007-08-15T07:42:01Z","timestamp":1187163721000},"page":"320-327","source":"Crossref","is-referenced-by-count":0,"title":["Design of Secure Monitor in the Secure Zone Cooperation"],"prefix":"10.1007","author":[{"given":"Gaesoon","family":"Ahn","sequence":"first","affiliation":[]},{"given":"B.","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Tai M.","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"key":"34_CR1","unstructured":"B. Chang, D. Kim, Y. Kwon, T. Nam, T. Chung, Security management by zone cooperation in active network environment, in: Proceedings of the 2002 International Conference on Security and Management (SAM\u201902), Las Vegas, USA, 2002, pp. 187\u2013192."},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"B. Cubaleska, M. Schneider, Applying trust policies for protecting mobile agents against DoS, in: Proceedings of the Third IEEE International Workshop on Policies for Distributed Systems and Networks, Monterey, USA, 2002, pp. 198\u2013201.","DOI":"10.1109\/POLICY.2002.1011307"},{"key":"34_CR3","unstructured":"D. Chapman, D. Zwicky, Building Internet Firewalls, O\u2019Reilly & Associates, Inc., 1996."},{"key":"34_CR4","unstructured":"S. Harris, Denying Denial-of-Service, Information Security Magazine, Sept. 2001, http:\/\/www.infosecuritymag.com\/articles\/september01\/cover.shtml ."},{"key":"34_CR5","unstructured":"K. Houle, G. Weaver, Trends in Denial of Service v1.0, Report of the CERT\/CC, Oct. 2001, http:\/\/www.cert.org\/archive\/pdf\/DoS_trends.pdf ."},{"key":"34_CR6","unstructured":"G. Helmer, J. Wong, V. Honavar, L. Miller, Lightweight agents for intrusion detection, Submitted to the Journal of Systems and Software, Iowa State University, Nov. 2000, http:\/\/latte.cs.iastate.edu\/~ghelmer\/NewFacets.ps ."},{"key":"34_CR7","unstructured":"C. Kaufman, R. Perlman, M. Speciner, Network Security: PRIVATE Communication in a PUBLIC World, Prentice Hall PTR, 1995."},{"key":"34_CR8","unstructured":"S. McClure, J. Scambray, G. Kurtz, Hacking Exposed-Network Security Secrets & Solu-tions, McGraw-Hill Companies, 1999."},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"D. Sterne, K. Djahandari, R. Balupari, W. Cholter, B. Babson, B. Wilson, P. Narasimhan, A. Purtell, D. Schnackenberg, S. Linden, Active network based DDoS defense, in: Proceedings of the DARPA Active Networks Conference and Exposition (DANCE\u201902), San Francisco, CA, 2002, pp. 193\u2013203.","DOI":"10.1109\/DANCE.2002.1003493"},{"issue":"1","key":"34_CR10","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/45.913204","volume":"20","author":"R. Venkateswaran","year":"2001","unstructured":"R. Venkateswaran, Virtual private networks, IEEE Potentials, Vol. 20,No. 1, Feb-March 2001, pp. 11\u201315","journal-title":"IEEE Potentials"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Kemmerer, R.A., Vigna, G., Intrusion detection: a brief history and overview, Computer, Volume:35, Issue:4, supl27\u2013supl30,April 2002.","DOI":"10.1109\/MC.2002.1012428"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2014 ICCSA 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44843-8_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T02:13:47Z","timestamp":1556763227000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44843-8_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401612","9783540448433"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-44843-8_34","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}