{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T05:22:17Z","timestamp":1740374537675,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208273"},{"type":"electronic","value":"9783540245919"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24591-9_10","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T07:36:56Z","timestamp":1280389016000},"page":"124-134","source":"Crossref","is-referenced-by-count":3,"title":["Intrusion-Tolerant System Design for Web Server Survivability"],"prefix":"10.1007","author":[{"given":"Dae-Sik","family":"Choi","sequence":"first","affiliation":[]},{"given":"Eul Gyu","family":"Im","sequence":"additional","affiliation":[]},{"given":"Cheol-Won","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Computer Security Institute\/Federal Bureau of Investigation: Computer crime and security survey (2001)"},{"key":"10_CR2","unstructured":"Symantec Corp.: Symantec internet security threat report, vol. i (2002)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Ellison, B., Fisher, D.A., Linger, R.C., Lipson, H.F., Longstaff, T., Mead, N.R.: Survivable network systems: An emerging discipline. Technical Report CMU\/SEI- 97-TR-013, Carnegie-Mellon University Software Engineering Institute (1997)","DOI":"10.21236\/ADA341963"},{"key":"10_CR4","unstructured":"Pal, P., Webber, F., Schantz, R.E., Loyall, J.P.: Intrusion tolerant systems. In: Proceedings of the IEEE Information Survivability Workshop, Boston, Massachusetts, U.S.A. (2000)"},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/604264.604270","volume":"30","author":"W. Lee","year":"2001","unstructured":"Lee, W., Fan, W.: Mining system audit data: opportunities and challenges. ACM SIGMOD Record\u00a030, 35\u201344 (2001)","journal-title":"ACM SIGMOD Record"},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/508171.508183","volume-title":"Proceedings of the 2001 workshop on New security paradigms","author":"P. Pal","year":"2001","unstructured":"Pal, P., Webber, F., Schantz, R.: Survival by defense-enabling. In: Proceedings of the 2001 workshop on New security paradigms, pp. 71\u201378. ACM Press, New York (2001)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Rathi, M., Anjum, F., Zbib, R., Ghosh, A., Umar, A.: Investigation of intrusion tolerance for COTS middleware. In: Proceedings of the IEEE International Conference on Communications 2002, vol.\u00a02, pp. 1169\u20131173 (2002)","DOI":"10.1109\/ICC.2002.997034"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Stavridou, V., Dutertre, B., Riemenschneider, R.A., Saidi, H.: Intrusion tolerant software architectures. In: Proceedings of the DARPA Information Survivability Conference & Exposition (DISCEX) 2001, vol.\u00a02, pp. 230\u2013241 (2001)","DOI":"10.1109\/DISCEX.2001.932175"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Wang, F., Upppalli, R.: SITAR: a scalable instrusion-tolerant architecture for distributed services - a technology summary. In: Proceedings of the DARPA Information Survivability Conference & Exposition (DISCEX) 2003, vol.\u00a02, pp. 153\u2013155 (2003)","DOI":"10.1109\/DISCEX.2003.1194957"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Wang, R., Wang, F., Byrd, G.T.: Design and implementation of acceptance monitor for building scalable intrusion tolerant system. In: Proceedings of the Tenth International Conference on Computer Communications and Networks, Scottsdale, AZ, USA, pp. 200\u2013205 (2001)","DOI":"10.1109\/ICCCN.2001.956241"},{"key":"10_CR11","unstructured":"Wang, F., Gong, F., Sargor, C., Goseva-Popstojanova, K., Trivedi, K., Jou, F.: SITAR: A scalable intrusion-tolerant architecture for distributed services. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, pp. 38\u201345 (2001)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24591-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T15:19:34Z","timestamp":1740323974000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24591-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208273","9783540245919"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24591-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}