{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T04:47:26Z","timestamp":1775882846169,"version":"3.50.1"},"publisher-location":"Boston, MA","reference-count":15,"publisher":"Springer US","isbn-type":[{"value":"9780387723662","type":"print"},{"value":"9780387723679","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-72367-9_32","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T23:12:08Z","timestamp":1194649928000},"page":"373-384","source":"Crossref","is-referenced-by-count":7,"title":["FirePatch: Secure and Time-Critical Dissemination of Software Patches"],"prefix":"10.1007","author":[{"given":"H\u00e5vard","family":"Johansen","sequence":"first","affiliation":[]},{"given":"Dag","family":"Johansen","sequence":"additional","affiliation":[]},{"given":"Robbert","family":"van Renesse","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"12","key":"32_CR1","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/2.889093","volume":"33","author":"W. A. Arbaugh","year":"2000","unstructured":"William A. Arbaugh, William L. Fithen, and John McHugh. Windows of Vulnerability: A case study analysis. IEEE Computer, 33(12):52\u201359, 2000.","journal-title":"IEEE Computer"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Hilary K. Browne, William A. Arbaugh, John McHugh, and William L. Fithen. A trend analysis of exploitations. In Proc. of the 2001 IEEE Symp. on Security and Privacy, pages 214\u2013229, 2001.","DOI":"10.1109\/SECPRI.2001.924300"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, Animesh Nandi, Antony Rowstron, and Atul Singh. SplitStream: High-bandwidth multicast in cooperative environments. In Proc. of the 19th ACM Symp. on Operating Systems Principles, pages 298\u2013313, 2003.","DOI":"10.1145\/945445.945474"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, and Paul Barham. Vigilante: End-to-end containment of Internet worms. In Proc. of the 20th ACM Symp. on Operating Systems Principles, pages 133\u2013147, 2005.","DOI":"10.1145\/1095810.1095824"},{"key":"32_CR5","unstructured":"Halvar Flake. Structural comparison of executable objects. In Proc. of the 2004 Conf. on Detection of Intrusions and Malware & Vulnerability Assessment, Lecture Notes in Informatics, pages 161\u2013173, 2004."},{"issue":"4","key":"32_CR6","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1145\/1151659.1159961","volume":"36","author":"C. Gkantsidis","year":"2006","unstructured":"Christos Gkantsidis, Thomas Karagiannis, Pablo Rodriguez, and Milan Vojnovic. Planet scale software updates. ACM SIGCOMM Computer Communication Review, 36(4):423\u2013434, 2006.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Maya Haridasan and Robbert van Renesse. Defense against intrusion in a live streaming multicast system. In Proc. of the 6th IEEE Int. Conf. on Peer-to-Peer Computing, pages 185\u2013192, 2006.","DOI":"10.1109\/P2P.2006.15"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"H\u00e5vard Johansen, Andr\u00e9 Allavena, and Robbert van Renesse. Fireflies: Scalable support for intrusion-tolerant network overlays. In Proc. of the 11th ACM Eurosys, pages 3\u201313, 2006.","DOI":"10.1145\/1217935.1217937"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Ashlesha Joshi, Samuel T. King, George W. Dunlap, and Peter M. Chen. Detecting past and present intrusions through vulnerability-specific predicates. In Proc. of the 20th ACM Symp. on Operating Systems Principles, pages 91\u2013104, 2005.","DOI":"10.1145\/1095810.1095820"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Dejan Kostic, Adolfo Rodriguez, Jeannie Albrecht, and Amin Vahdat. Bullet: High bandwidth data dissemination using an overlay mesh. In Proc. of the 19th ACM Symp. on Operating Systems Principles, pages 282\u2013297, 2003.","DOI":"10.1145\/945445.945473"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Vinay S. Pai, Kapil Kumar, Karthik Tamilmani, Vinay Sambamurthy, and Alexander E. Mohr. Chainsaw: Eliminating trees from overlay multicast. In Proc. of the 4th Int. Workshop on Peer-to-Peer Systems, volume 3640 of Lecture Notes in Computer Science, pages 127\u2013140, 2005.","DOI":"10.1007\/11558989_12"},{"key":"32_CR12","unstructured":"Brad Stone. A lively market, legal and not, for software bugs. The New York Times, online, January 30 2007. http:\/\/www.nytimes.com\/2007\/01\/30\/technology\/30bugs.html ."},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage. Scalability, fidelity, and containment in the Potemkin virtual honeyfarm. In Proc. of the 20th ACM Symp. on Operating Systems Principles, pages 148\u2013162, 2005.","DOI":"10.1145\/1095810.1095825"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, and Alf Zugenmaier. Shield: vulnerability-driven network filters for preventing known vulnerability exploits. In Proc. of the 2004 Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications, pages 193\u2013204, 2004.","DOI":"10.1145\/1015467.1015489"},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"Beverly Yang and Hector Garcia-Molina. Designing a super-peer network. In Proc. of the 19th IEEE Int. Conf. on Data Engineering, pages 49\u201360, 2003.","DOI":"10.1109\/ICDE.2003.1260781"}],"container-title":["IFIP International Federation for Information Processing","New Approaches for Security, Privacy and Trust in Complex Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-72367-9_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T05:56:01Z","timestamp":1737525361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-72367-9_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387723662","9780387723679"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-72367-9_32","relation":{},"ISSN":["1571-5736"],"issn-type":[{"value":"1571-5736","type":"print"}],"subject":[],"published":{"date-parts":[[2007]]}}}