{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:24:42Z","timestamp":1742387082617},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319981765"},{"type":"electronic","value":"9783319981772"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-47961-9_17","type":"book-chapter","created":{"date-parts":[[2007,5,18]],"date-time":"2007-05-18T12:52:45Z","timestamp":1179492765000},"page":"216-229","source":"Crossref","is-referenced-by-count":5,"title":["Can We Ever Build Survivable Systems from COTS Components?"],"prefix":"10.1007","author":[{"given":"Howard F.","family":"Lipson","sequence":"first","affiliation":[]},{"given":"Nancy R.","family":"Mead","sequence":"additional","affiliation":[]},{"given":"Andrew P.","family":"Moore","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,5,29]]},"reference":[{"key":"17_CR1","unstructured":"R. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems, pages 527\u2013529. John Wiley & Sons, 2001."},{"issue":"5","key":"17_CR2","first-page":"91","volume":"34","author":"V. R. Basili","year":"2001","unstructured":"V. R. Basili and B. Boehm. COTS-based systems top 10 list. IEEE Software, 34(5):91\u201393, May 2001.","journal-title":"IEEE Software"},{"key":"17_CR3","unstructured":"L. Brownsword, P. Oberndorf, and C. Sledge. An activity framework for COTS-based systems. Crosstalk: The Journal of Defense Software Engineering, 13(9), September 2000."},{"key":"17_CR4","unstructured":"Common Criteria Implementation Board. Common Criteria for Information Technology Security Evaluation, Version 2.1. Number CCIMB-99-031. August 1999. See: http:\/\/csrc.ncsl.nist.gov\/cc\/ ."},{"key":"17_CR5","unstructured":"C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole. Buffer overflows: Attacks and defenses for the vulnerability of the decade. In DARPA Information Survivability Conference and Expo (DISCEX), Hilton Head, SC, January 2000. IEEE Computer Society."},{"key":"17_CR6","unstructured":"R. J. Ellison, D. A. Fisher, R. C. Linger, H. F. Lipson, T. A. Longstaff, and N. R. Mead. Survivable systems: An emerging discipline. In Proceedings of the 11th Canadian Information Technology Security Symposium (CITSS\u201999), Ottawa, Ontario, May 1999. Communications Security Establishment, Government of Canada. See: http:\/\/www.cert.org\/research\/ for additional papers on this topic."},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"J. Froscher and M. Kang. A client-server architecture supporting MLS interoperability with COTS components. In Proc. MILCOM 97, Monterey, CA, November 1997.","DOI":"10.21236\/ADA465304"},{"key":"17_CR8","volume-title":"SEI Monographs on the Use of Commercial Software in Government Systems","author":"S. A. Hissam","year":"1998","unstructured":"S. A. Hissam, D. Carney, and D. Plakosh. DoD Security Needs and COTS-Based Systems. SEI Monographs on the Use of Commercial Software in Government Systems. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, September 1998. See: http:\/\/www.sei.cmu.edu\/cbs\/papers\/monographs\/dod-security-needs.htm ."},{"key":"17_CR9","unstructured":"R. Kazman, M. Klein, M. Barbacci, T. Longstaff, H. F. Lipson, and S. J. Carriere. The architecture tradeoff analysis method. In Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, Monterey, CA, August 1998. IEEE Computer Society. See: http:\/\/www.sei.cmu.edu\/ata\/ for additional papers on this topic."},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"U. Lindqvist and E. Johnson. A map of security risks associated with using COTS. IEEE Computer, pages 60\u201366, June 1998.","DOI":"10.1109\/2.683009"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"H. Lipson and D. Fisher. Survivability-A new technical and business perspective on security. In Proceedings of the New Security Paradigms Workshop. ACM, September 1999.","DOI":"10.1145\/335169.335187"},{"issue":"2","key":"17_CR12","first-page":"4","volume":"14","author":"N. R. Mead","year":"2001","unstructured":"N. R. Mead, H. F. Lipson, and C. A. Sledge. Towards survivable COTS-based systems. Cutter IT Journal, 14(2):4\u201311, February 2001.","journal-title":"Cutter IT Journal"}],"container-title":["Notes on Numerical Fluid Mechanics and Multidisciplinary Design","Active Flow and Combustion Control 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47961-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T18:19:45Z","timestamp":1683829185000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47961-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783319981765","9783319981772"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-47961-9_17","relation":{},"ISSN":["1612-2909","1860-0824"],"issn-type":[{"type":"print","value":"1612-2909"},{"type":"electronic","value":"1860-0824"}],"subject":[],"published":{"date-parts":[[2002]]}}}