{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:28:18Z","timestamp":1725560898775},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208273"},{"type":"electronic","value":"9783540245919"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24591-9_14","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T03:36:56Z","timestamp":1280374616000},"page":"174-187","source":"Crossref","is-referenced-by-count":2,"title":["Secure System Architecture Based on Dynamic Resource Reallocation"],"prefix":"10.1007","author":[{"given":"Byoung Joon","family":"Min","sequence":"first","affiliation":[]},{"given":"Sung Ki","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Joong Sup","family":"Choi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Hiltunen, M.A., et al.: Survivability through Customization and Adaptability: The Cactus Approach. In: DARPA Information Survivability Conference & EXposition, pp. 294\u2013306 (1999) 0-7695-0490-6\/99"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Moore, A.P.: Attack Modeling for Information Security and Survivability, Technical Node, CMU\/SEI-2001-TN-001, CMU (2001)","DOI":"10.21236\/ADA387544"},{"key":"14_CR3","unstructured":"National Security Agency, Defence Advanced Research Projects Agency, Office of the Assistant Secretary of Defence, Securing the U.S Defence Information Infrastructures: A Proposed Approach, Technical Report (1998)"},{"key":"14_CR4","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/322186.322188","volume":"27\/2","author":"M. Pease","year":"1980","unstructured":"Pease, M., Shostak, R., Lamport, L.: Reaching Agreement in the Presence of Faults. Journal of the ACM\u00a027\/2, 228\u2013234 (1980)","journal-title":"Journal of the ACM"},{"key":"14_CR5","unstructured":"Randell, B.: Dependability - Unifying Concept. Computer Security, Dependability & Assurance: From Needs to Solutions (1998) ISBN 0-7695-0337-3\/99"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Reynolds, J., et al.: The Design and Implementation of an Intrusion Tolerant System. In: Proc. of Int\u2019l Conference on Dependable Systems and Networks, Washington D.C., pp. 258\u2013290 (June 2002)","DOI":"10.1109\/DSN.2002.1028912"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Stavridou, V., et al.: Intrusion Tolerant Software Architectures. In: DARPA Information Survivability Conference & EXposition, Anaheim (June 2001) ISBN 0-7695-1212-7\/01","DOI":"10.1109\/DISCEX.2001.932175"},{"key":"14_CR8","unstructured":"Wang, F., et al.: SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services. In: Proc. of 2001 IEEE Workshop on Information Assurance and Security US Military Academy, pp. 38\u201345, West Point, NY (June 2001)"},{"key":"14_CR9","unstructured":"Wilikens, M., et al.: Defining the European Dependability Initiative. Dependability & Assurance: From Needs to Solutions, Report of the Workshop on Dependability of Critical Systems and Services in the Information Society, Italy (December 1997)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24591-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T19:40:49Z","timestamp":1559331649000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24591-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208273","9783540245919"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24591-9_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}