{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:12:48Z","timestamp":1725574368860},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540235781"},{"type":"electronic","value":"9783540302070"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30207-0_52","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T15:51:21Z","timestamp":1294415481000},"page":"414-421","source":"Crossref","is-referenced-by-count":0,"title":["Autonomic Computing for Defense-in-Depth Information Assurance: Architecture and a Case Study"],"prefix":"10.1007","author":[{"given":"Xin","family":"Xu","sequence":"first","affiliation":[]},{"given":"Zunguo","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Xuan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"McHugh, J., Christie, A., Allen, J.: Defending Yourself: The Role of Intrusion Detection Systems. IEEE Software, 42\u201351 (2000)","key":"52_CR1","DOI":"10.1109\/52.877859"},{"unstructured":"Huang, Z.G., Lu, X.C., Wang, H.M.: A Diversified Dynamic Redundancy Method Exploiting the Intrusion Tolerance. In: Proceedings of the Third Information Survivability Workshop (ISW 2000), Boston MA, USA, October 24-26 (2000)","key":"52_CR2"},{"unstructured":"Deep, M., David, T.: Multi-Layered Network Survivability \u2013 Models, Analysis, Architecture, Framework and Implementation: An Overview. In: Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX 2000), Hilton Head Island, South Carolina, January 25-27 (2000)","key":"52_CR3"},{"unstructured":"Information Assurance through Defense-in-Depth. Directorate for Command, Control, Communications, and Computer Systems. U.S. Department of Defense Joint Staff (February 2000)","key":"52_CR4"},{"key":"52_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1147\/sj.421.0005","volume":"42","author":"A.G. Ganek","year":"2003","unstructured":"Ganek, A.G., et al.: The Dawning of the Autonomic Computing Era. IBM Systems Journal\u00a042, 5\u201318 (2003)","journal-title":"IBM Systems Journal"},{"key":"52_CR6","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1147\/sj.421.0150","volume":"42","author":"R. Haas","year":"2003","unstructured":"Haas, R., Droz, P., Stiller, B.: Autonomic Service Deployment in Networks. IBM Systems Journal\u00a042, 150\u2013164 (2003)","journal-title":"IBM Systems Journal"},{"key":"52_CR7","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1147\/sj.421.0165","volume":"42","author":"D.F. Bantz","year":"2003","unstructured":"Bantz, D.F., Bisdikian, C., et al.: Autonomic Personal Computing. IBM Systems Journal\u00a042, 165\u2013176 (2003)","journal-title":"IBM Systems Journal"},{"unstructured":"Horn, P.: Autonomic Computing: IBM\u2019s Perspective on the State of Information Technology, IBM Corporation (2001), available at \n                    \n                      http:\/\/www.research.ibm.com\/autonomic\/manifesto\/autonomic_computing.pdf","key":"52_CR8"},{"doi-asserted-by":"crossref","unstructured":"Bass, T., Robichaux, R.: Defense-In-Depth Revisited: Qualitative Risk Analysis Methodology for Complex Network-Centric Operations. In: Proc. of IEEE MILCOM 2001, October 28-31, pp. 64\u201370 (2001)","key":"52_CR9","DOI":"10.1109\/MILCOM.2001.985765"},{"key":"52_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/978-3-540-39425-9_65","volume-title":"Advanced Parallel Processing Technologies","author":"Z.G. Huang","year":"2003","unstructured":"Huang, Z.G.: The Tenure Duty Method (TDM) in the Active Incident Recovery Research. In: Zhou, X., Xu, M., J\u00e4hnichen, S., Cao, J. (eds.) APPT 2003. LNCS, vol.\u00a02834, pp. 557\u2013564. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Grid and Cooperative Computing - GCC 2004 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30207-0_52.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:55:22Z","timestamp":1619999722000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30207-0_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540235781","9783540302070"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30207-0_52","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}