{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:37:48Z","timestamp":1725557868299},"publisher-location":"Boston, MA","reference-count":14,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387885223"},{"type":"electronic","value":"9780387885230"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-88523-0_10","type":"book-chapter","created":{"date-parts":[[2010,6,15]],"date-time":"2010-06-15T13:03:08Z","timestamp":1276606988000},"page":"129-140","source":"Crossref","is-referenced-by-count":0,"title":["Designing Security-Hardened Microkernels For Field Devices"],"prefix":"10.1007","author":[{"given":"Jeffrey","family":"Hieb","sequence":"first","affiliation":[]},{"given":"James","family":"Graham","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1_10","doi-asserted-by":"crossref","unstructured":"J. Alves-Foss, C. Taylor and P. Oman, A multi-layered approach to security in high assurance systems, Proceedings of the Thirty-Seventh Annual Hawaii International Conference on System Sciences, pp. 302\u2013311, 2004.","DOI":"10.1109\/HICSS.2004.1265709"},{"key":"10_CR2_10","volume-title":"Evaluation of MILS and Reduced Kernel Security Concepts for SCADA Remote Terminal Units, Technical Report TR-ISRL-06-02, Intelligent Systems Research Laboratory, Department of Computer Engineering and Computer Science","author":"B. Guffy","year":"2006","unstructured":"B. Guffy and J. Graham, Evaluation of MILS and Reduced Kernel Security Concepts for SCADA Remote Terminal Units, Technical Report TR-ISRL-06-02, Intelligent Systems Research Laboratory, Department of Computer Engineering and Computer Science, University of Louisville, Louisville, Kentucky, 2006."},{"key":"10_CR3_10","unstructured":"Gumstix, Products, Portola Valley, California (www.gumstix.com\/prod ucts.html)."},{"key":"10_CR4_10","doi-asserted-by":"crossref","unstructured":"N. Hanebutte, P. Oman, M. Loosbrock, A. Holland, W. Harrison and J. Alves-Foss, Software mediators for transparent channel control in unbounded environments, Proceedings of the Sixth Annual IEEE SMC Information Assurance Workshop, pp. 201\u2013206, 2005.","DOI":"10.1109\/IAW.2005.1495953"},{"key":"10_CR5_10","doi-asserted-by":"crossref","unstructured":"H. Hartig, M. Hohmuth, N. Feske, C. Helmuth, A. Lackorzynski, F. Mehn-ert and M. Peter, The Nizza secure-system architecture, Proceedings of the International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2005.","DOI":"10.1109\/COLCOM.2005.1651218"},{"key":"10_CR6_10","unstructured":"J. Hieb and J. Graham, Security-enhanced remote terminal units for SCADA networks, Proceedings of Nineteenth ISCA International Conference on Computer Applications in Industry and Engineering, pp. 271\u2013276, 2006."},{"key":"10_CR7_10","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-0-387-75462-8_10","volume-title":"Critical Infrastructure Protection","author":"J. Hieb","year":"2007","unstructured":"J. Hieb, S. Patel and J. Graham, Security enhancements for distributed control systems, in Critical Infrastructure Protection, E. Goetz and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 133\u2013146, 2007."},{"issue":"7","key":"10_CR8_10","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1016\/j.cose.2006.03.001","volume":"25","author":"V. Igure","year":"2006","unstructured":"V. Igure, S. Laughter and R. Williams, Security issues in SCADA networks, Computers and Security, vol. 25(7), pp. 498\u2013506, 2006.","journal-title":"Computers and Security"},{"issue":"5","key":"10_CR9_10","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1145\/224057.224075","volume":"29","author":"J. Liedtke","year":"1995","unstructured":"J. Liedtke, On micro-kernel construction, ACM SIGOPS Operating Systems Review, vol. 29(5), pp. 237\u2013250, 1995.","journal-title":"ACM SIGOPS Operating Systems Review"},{"issue":"5","key":"10_CR10_10","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/MSP.2005.136","volume":"3","author":"A. Miller","year":"2005","unstructured":"A. Miller, Trends in process control systems security, IEEE Security and Privacy, vol. 3(5), pp. 57\u201360, 2005.","journal-title":"IEEE Security and Privacy"},{"key":"10_CR11_10","unstructured":"National ICT Australia, Project Iguana, Eveleigh, Australia (ertos.nicta.com.au\/software\/kenge\/iguana-project\/latest)."},{"key":"10_CR12_10","unstructured":"Open Kernel Labs, Products, Chicago, Illinois (www.ok-labs.com)."},{"issue":"4","key":"10_CR13_10","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1145\/1218063.1217951","volume":"40","author":"L. Singaravelu","year":"2006","unstructured":"L. Singaravelu, C. Pu, H. Hartig and C. Helmuth, Reducing TCB complexity for security-sensitive applications: Three case studies, ACM SIGOPS Systems Review, vol. 40(4), pp. 161\u2013174, 2006.","journal-title":"ACM SIGOPS Systems Review"},{"issue":"5","key":"10_CR14_10","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MC.2006.156","volume":"39","author":"A. Tanenbaum","year":"2006","unstructured":"A. Tanenbaum, J. Herder and H. Bos, Can we make operating systems reliable and secure? IEEE Computer, vol. 39(5), pp. 44\u201351, 2006.","journal-title":"IEEE Computer"}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Critical Infrastructure Protection II"],"original-title":[],"language":"en","deposited":{"date-parts":[[2019,3,3]],"date-time":"2019-03-03T13:45:58Z","timestamp":1551620758000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-88523-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387885223","9780387885230"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-88523-0_10","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[]}}