{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:42:27Z","timestamp":1725565347922},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220602"},{"type":"electronic","value":"9783540247685"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24768-5_73","type":"book-chapter","created":{"date-parts":[[2010,9,11]],"date-time":"2010-09-11T01:14:08Z","timestamp":1284167648000},"page":"681-688","source":"Crossref","is-referenced-by-count":0,"title":["A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments"],"prefix":"10.1007","author":[{"given":"Jin S.","family":"Yang","sequence":"first","affiliation":[]},{"given":"Young J.","family":"Han","sequence":"additional","affiliation":[]},{"given":"Dong S.","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Beom H.","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Tai M.","family":"Chung","sequence":"additional","affiliation":[]},{"given":"Jung C.","family":"Na","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"73_CR1","volume-title":"Operating system concepts","author":"A. Silberschatz","year":"2002","unstructured":"Silberschatz, A., et al.: Operating system concepts, 6th edn. John wiley and sons, inc., Chichester (2002)","edition":"6"},{"key":"73_CR2","unstructured":"AN NodeOS Working Group, NodeOS Interface Specification (November 2001)"},{"key":"73_CR3","unstructured":"AN Security Working Group, Security Architecture for Active Nets (November 2001)"},{"key":"73_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-540-48507-0_20","volume-title":"Active Networks","author":"D. Raz","year":"1999","unstructured":"Raz, D., Shavitt, Y.: An Active Network Approach to Efficient Network Management. In: Covaci, S. (ed.) IWAN 1999. LNCS, vol.\u00a01653, pp. 220\u2013231. Springer, Heidelberg (1999)"},{"key":"73_CR5","doi-asserted-by":"crossref","unstructured":"Wetherall, D.J., et al.: ANTS: A Toolkit for Building and Dynamically Deploying Network Protocols. In: IEEE OPENARCH 1998 Proc., San Francisco (April 1998)","DOI":"10.1109\/OPNARC.1998.662048"},{"key":"73_CR6","doi-asserted-by":"crossref","unstructured":"Tennenhouse, D.L., et al.: A Survey of Active Network Research. IEEE communications magazine, 80\u201386 (January 1997)","DOI":"10.1109\/35.568214"},{"key":"73_CR7","doi-asserted-by":"crossref","unstructured":"Tennenhouse, D.L., Wetherall, D.J.: Towards an active network architecture. In: Multimedia Computing and Networking 1996 (January 1996)","DOI":"10.1145\/231699.231701"},{"key":"73_CR8","unstructured":"Kim, H.K., et al.: Vulnerability Management Architecture for Active Nodes. KNOM Review\u00a05(2) (December 2002)"},{"key":"73_CR9","doi-asserted-by":"crossref","unstructured":"J. S. Yang, et al., \u201dA Study on Security Vulnerability of Active Network\u201d, Proc. of the 19th KIPS Fall Conference, Korea, May 2003.","DOI":"10.1016\/S1353-4858(03)00706-2"},{"key":"73_CR10","doi-asserted-by":"crossref","unstructured":"Psounis, K.: Active Networks: Applications, Security, Safety and Architectures. IEEE Communications Surveys (first Quarter 1999)","DOI":"10.1109\/COMST.1999.5340509"},{"key":"73_CR11","unstructured":"Calvert, K.: Architectural Framework for Active Networks. Technical report, AN Architecture Working Group (2000)"},{"key":"73_CR12","doi-asserted-by":"crossref","unstructured":"Hicks, M., et al.: PLAN: A Packet Language for Active Networks. ICFP (1998)","DOI":"10.1145\/289423.289431"},{"key":"73_CR13","doi-asserted-by":"crossref","unstructured":"Tullmann, P., et al.: JANOS: A Java-Oriented OS for Active Network Nodes. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS\u00a019(3) (March 2001)","DOI":"10.1109\/49.917710"},{"key":"73_CR14","volume-title":"Java Security","author":"S. Oaks","year":"2001","unstructured":"Oaks, S.: Java Security. O\u2019Reilly, Sebastopol (June 2001)"},{"key":"73_CR15","unstructured":"Aslam, T., et al.: Use of a Taxonomy of Security faults. In: Proc. of the national computer security conference;Coast laboratory Technical Report 96-05 (1996)"},{"key":"73_CR16","unstructured":"Certcc-kr Homepage, http:\/\/www.certcc.or.kr\/"},{"key":"73_CR17","unstructured":"Security Focus Homepage, http:\/\/www.securityfocus.com\/"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24768-5_73.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T14:41:39Z","timestamp":1636468899000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24768-5_73"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220602","9783540247685"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24768-5_73","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}