{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T08:27:01Z","timestamp":1759825621683,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540238980"},{"type":"electronic","value":"9783540304838"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30483-8_20","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T22:47:02Z","timestamp":1294440422000},"page":"161-166","source":"Crossref","is-referenced-by-count":3,"title":["Availability Analysis and Comparison of Different Intrusion-Tolerant Systems"],"prefix":"10.1007","author":[{"given":"Chao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jian-Feng","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Just, J., Reynolds, J.: HACQIT (Hierarchical Adaptive Control of QoS for Intrusion Tolerance). In: 17th Annual Computer Security Applications Conference (2001)"},{"key":"20_CR2","unstructured":"Courtney, T., Lyons, J., Ramasamy, H.V., Sanders, W.H., Seri, M., Atighetchi, M., Rubel, P., Jones, C., Webber, F., Pal, P., Watro, R., Gossett, J., Cukier, M.: Providing Intrusion Tolerance with ITUA. In: Supplement of the 2002 Intl Conf. on Dependable Sys. and Networks (DSN 2002), June 2002, pp. C.5.1\u2013C.5.3 (2002)"},{"key":"20_CR3","unstructured":"Wang, F., Gong, F., Jou, F., Wang, R.: SITAR: A scalable intrusion tolerance architecture for distributed service. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, June 4-5, pp. 38\u201345 (2001)"},{"key":"20_CR4","unstructured":"Wu, T., Malkin, M., Boneh, D.: Building Intrusion Tolerance Applications. In: Proceedings of the 8th USENIX Security Symposium, pp. 79\u201391 (1999)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Singh, S., Cukier, M., Sanders, W.H.: Probabilistic Validation of an Intrusion- Tolerant Replication System. In: Proc. Intl Conf. on Dependable Sys. and Networking (DSN 2003), pp. 615\u2013624 (2003)","DOI":"10.1109\/DSN.2003.1209971"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-540-45214-0_9","volume-title":"Dependable Computing","author":"V. Gupta","year":"2003","unstructured":"Gupta, V., Lam, V., Govind, H., Ramasamy, V., Sanders, W.H., Singh, S.: Dependability and performance evaluation of intrusion-tolerant server architectures. In: de Lemos, R., Weber, T.S., Camargo Jr., J.B. (eds.) LADC 2003. LNCS, vol.\u00a02847, pp. 81\u2013101. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Content Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30483-8_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T14:43:21Z","timestamp":1740840201000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30483-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540238980","9783540304838"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30483-8_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}