{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:37:03Z","timestamp":1759091823725,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540202240"},{"type":"electronic","value":"9783540452140"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45214-0_9","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T20:59:04Z","timestamp":1277845144000},"page":"81-101","source":"Crossref","is-referenced-by-count":21,"title":["Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures"],"prefix":"10.1007","author":[{"given":"Vishu","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Vinh","family":"Lam","sequence":"additional","affiliation":[]},{"given":"HariGovind V.","family":"Ramasamy","sequence":"additional","affiliation":[]},{"given":"William H.","family":"Sanders","sequence":"additional","affiliation":[]},{"given":"Sankalp","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"9_CR1","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/4236.769420","volume":"3","author":"V. Cardellini","year":"1999","unstructured":"Cardellini, V., Colajanni, M., Yu, P.S.: Dynamic Load Balancing on Web-server Systems. IEEE Internet Computing\u00a03(3), 28\u201339 (1999)","journal-title":"IEEE Internet Computing"},{"key":"9_CR2","unstructured":"Castro, M., Liskov, B.: Practical Byzantine Fault Tolerance. In: Proc. Third Symp. on Operating Sys. Design and Implementation (OSDI 1999), pp. 173\u2013186 (1999)"},{"key":"9_CR3","unstructured":"Cukier, M., Lyons, J., Pandey, P., Ramasamy, H.V., Sanders, W.H., Pal, P., Webber, F., Schantz, R., Loyall, J., Watro, R., Atighetchi, M., Gossett, J.: Intrusion Tolerance Approaches in ITUA. In: Fast Abstract in Supplement of the 2001 International Conference on Dependable Systems and Networks, pp. B64\u2013B65 (2001)"},{"issue":"10","key":"9_CR4","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1109\/TSE.2002.1041052","volume":"28","author":"D.D. Deavours","year":"2002","unstructured":"Deavours, D.D., Clark, G., Courtney, T., Daly, D., Derisavi, S., Doyle, J.M., Sanders, W.H., Webster, P.G.: The M\u00f6bius Framework and Its Implementation. IEEE Trans. on Software Engineering\u00a028(10), 956\u2013969 (2002)","journal-title":"IEEE Trans. on Software Engineering"},{"key":"9_CR5","unstructured":"Delis, A., Roussopoulos, N.: Performance and Scalability of Client-Server Database Architectures. In: Proc. Intl Conf. in Very Large Data Bases (VLDB), pp. 610\u2013623 (1992)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Deswarte, Y., Blain, L., Fabre, J.C.: Intrusion Tolerance in Distributed Computing Systems. In: Proc. IEEE Symposium on Security and Privacy, pp. 110\u2013121 (1991)","DOI":"10.1109\/RISP.1991.130780"},{"key":"9_CR7","unstructured":"Draper Laboratories, Inc., Kinetic Application of Redundancy to Mitigate Attacks, DARPA OASIS Program, http:\/\/www.tolerantsystems.org\/ProjectSummaries\/IT_Using_Masking_Redundancy_and_Dispersion.html"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Gupta, V., Lam, V., Ramasamy, H.V., Sanders, W.H., Singh, S.: Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures. CRHC Technical Report (2003) (to appear)","DOI":"10.1007\/978-3-540-45214-0_9"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Lindqvist, U., Olovsson, T., Jonsson, E.: An Analysis of a Secure System Based on Trusted Components. In: Proc. Eleventh Annual Conf. on Computer Assurance (COMPASS 1996), Gaithersburg, Maryland, pp. 213\u2013223 (1996)","DOI":"10.1109\/CMPASS.1996.507889"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Ramasamy, H.V., Pandey, P., Lyons, J., Cukier, M., Sanders, W.H.: Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems. In: Proc. Intl Conf. on Dependable Sys. and Networks (DSN 2002), pp. 229\u2013238 (2002)","DOI":"10.1109\/DSN.2002.1028904"},{"key":"9_CR11","unstructured":"Sanders, W.H., Cukier, M., Webber, F., Pal, P., Watro, R.: Probabilistic Validation of Intrusion Tolerance. In: Fast Abstract in Supplemental Volume of the 2002 International Conference on Dependable Systems and Networks, pp. B78\u2013B79 (2002)"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/3-540-44667-2_9","volume-title":"Lectures on Formal Methods and Performance Analysis","author":"W.H. Sanders","year":"2001","unstructured":"Sanders, W.H., Meyer, J.F.: Stochastic Activity Networks: Formal Definitions and Concepts. In: Brinksma, E., Hermanns, H., Katoen, J.-P. (eds.) EEF School 2000 and FMPA 2000. LNCS, vol.\u00a02090, pp. 315\u2013343. Springer, Heidelberg (2001)"},{"issue":"4","key":"9_CR13","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1145\/98163.98167","volume":"22","author":"F. Schneider","year":"1990","unstructured":"Schneider, F.: Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial. ACM Computing Surveys\u00a022(4), 299\u2013319 (1990)","journal-title":"ACM Computing Surveys"},{"key":"9_CR14","unstructured":"Secure Computing Corporation, Intrusion Tolerant Server Infrastructure, DARPA OASIS Program, http:\/\/www.tolerantsystems.org\/ProjectSummaries\/_Intrusion_Tolerant_Server_Infrastructure.html"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Singh, S., Cukier, M., Sanders, W.H.: Probabilistic Validation of an Intrusion- Tolerant Replication System. In: Proc. Intl Conf. on Dependable Sys. and Networking (DSN 2003), pp. 615\u2013624 (2003)","DOI":"10.1109\/DSN.2003.1209971"}],"container-title":["Lecture Notes in Computer Science","Dependable Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45214-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T10:04:27Z","timestamp":1740218667000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45214-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540202240","9783540452140"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45214-0_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}