{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:35Z","timestamp":1725558995624},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540245483"},{"type":"electronic","value":"9783540305873"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-30587-3_27","type":"book-chapter","created":{"date-parts":[[2010,7,7]],"date-time":"2010-07-07T15:12:10Z","timestamp":1278515530000},"page":"168-177","source":"Crossref","is-referenced-by-count":4,"title":["Protective Wrapping of Off-the-Shelf Components"],"prefix":"10.1007","author":[{"given":"Meine","family":"van der Meulen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Steve","family":"Riddle","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lorenzo","family":"Strigini","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nigel","family":"Jefferson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Anderson, T., Feng, M., Riddle, S., Romanovsky, A.: Protective Wrapper Development. In: Proc. 2nd Int. Conf. on COTS-Based Software Systems, Ottawa, Canada (2003)","DOI":"10.1007\/3-540-36465-X_1"},{"key":"27_CR2","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/12.2185","volume":"C-37","author":"P.E. Ammann","year":"1988","unstructured":"Ammann, P.E., Knight, J.C.: Data Diversity: An Approach to Software Fault Tolerance. IEEE Transactions on Computers\u00a0C-37, 418\u2013425 (1988)","journal-title":"IEEE Transactions on Computers"},{"key":"27_CR3","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1109\/12.980005","volume":"C\u201351","author":"J. Arlat","year":"2002","unstructured":"Arlat, J., Fabre, J.-C., Rodriguez, M., Salles, F.: Dependability of COTS Microkernel-Based Systems. IEEE Transactions on Computers\u00a0C\u201351, 138\u2013163 (2002)","journal-title":"IEEE Transactions on Computers"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Cheung, S., Levitt, K.N.: A Formal-Specification Based Approach for Protecting the Domain Name System. In: Proc. DSN 2000, International Conference on Dependable Systems and Networks, New York, USA (2000)","DOI":"10.1109\/ICDSN.2000.857602"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Fetzer, C., Xiao, Z.: HEALERS: A Toolkit for Enhancing the Robustness and Security of Existing Applications. In: Proc. DSN 2003, International Conference on Dependable Systems and Networks, San Francisco, U.S.A. (2003)","DOI":"10.1109\/DSN.2003.1209942"},{"key":"27_CR6","unstructured":"Fraser, T., Badger, L., Feldman, M.: Hardening COTS Software with Generic Software Wrappers. In: Proc. 1999 IEEE Symp. on Security and Privacy, Oakland, CA, USA (1999)"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Ghosh, A.K., Schmid, M., Hill, F.: Wrapping Windows NT Software for Robustness. In: Proc. 29th IEEE International Symp. on Fault-Tolerant Computing (FTCS-29), Madison, USA (1999)","DOI":"10.1109\/FTCS.1999.781070"},{"key":"27_CR8","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/2.161279","volume":"25","author":"B. Meyer","year":"1992","unstructured":"Meyer, B.: Applying \u201cDesign by Contract\u201d. IEEE Computer\u00a025, 40\u201351 (1992)","journal-title":"IEEE Computer"},{"key":"27_CR9","unstructured":"Popov, P., Strigini, L., Riddle, S., Romanovsky, A.: Protective Wrapping of OTS Components. In: Proc. 4th ICSE Workshop on Component-Based Software Engineering: Component Certification and System Prediction, Toronto (2001)"}],"container-title":["Lecture Notes in Computer Science","COTS-Based Software Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30587-3_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T17:35:24Z","timestamp":1559237724000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30587-3_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540245483","9783540305873"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30587-3_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}