{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T05:26:55Z","timestamp":1737178015313,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540490180"},{"type":"electronic","value":"9783540498230"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/978-3-540-49823-0_27","type":"book-chapter","created":{"date-parts":[[2007,6,26]],"date-time":"2007-06-26T12:12:32Z","timestamp":1182859952000},"page":"378-394","source":"Crossref","is-referenced-by-count":1,"title":["A Dependable Intrusion Detection Architecture Based on Agreement Services"],"prefix":"10.1007","author":[{"given":"Michel","family":"Hurfin","sequence":"first","affiliation":[]},{"given":"Jean-Pierre","family":"Le Narzul","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Majorczyk","sequence":"additional","affiliation":[]},{"given":"Ludovic","family":"M\u00e9","sequence":"additional","affiliation":[]},{"given":"Ayda","family":"Saidane","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Totel","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Tronel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/11663812_3","volume-title":"Recent Advances in Intrusion Detection","author":"E. Totel","year":"2006","unstructured":"Totel, E., Majorczyk, F., M\u00e9, L.: COTS diversity based intrusion detection and application to web servers. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol.\u00a03858, pp. 43\u201362. Springer, Heidelberg (2006)"},{"key":"27_CR2","unstructured":"Tronel, F.: Applications des probl\u00e8mes d\u2019accord \u00e0 la tol\u00e9rance aux d\u00e9faillances dans les syst\u00e8mes distribu\u00e9s asynchrones. PhD thesis, Universit\u00e9 de Rennes (2003)"},{"key":"27_CR3","unstructured":"Greve, F.G.P.: R\u00e9ponses efficaces au besoin d\u2019accord dans un groupe. PhD thesis, Universit\u00e9 de Rennes I (2002)"},{"issue":"4","key":"27_CR4","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/227210.227225","volume":"39","author":"D. Powell","year":"1996","unstructured":"Powell, D.: Group communication. Communications of the ACM\u00a039(4), 50\u201353 (1996)","journal-title":"Communications of the ACM"},{"issue":"3","key":"27_CR5","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L. Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Transactions on Programming Languages Systems\u00a04(3), 382\u2013401 (1982)","journal-title":"ACM Transactions on Programming Languages Systems"},{"key":"27_CR6","unstructured":"Castro, M., Liskov, B.: Practical byzantine fault tolerance. In: OSDI: Symposium on Operating Systems Design and Implementation, USENIX Association, Co-sponsored by IEEE TCOS and ACM SIGOPS (1999)"},{"key":"27_CR7","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/3-540-60042-6_7","volume-title":"Selected Papers from the International Workshop on Theory and Practice in Distributed Systems","author":"M.K. Reiter","year":"1995","unstructured":"Reiter, M.K.: The Rampart toolkit for building high-integrity services. In: Selected Papers from the International Workshop on Theory and Practice in Distributed Systems, pp. 99\u2013110. Springer, London (1995)"},{"key":"27_CR8","volume-title":"On Designing Dependable Services with Diverse Off-The-Shelf SQL Servers","author":"I. Gashi","year":"2004","unstructured":"Gashi, I., Popov, P., Stankovic, V., Strigini, L.: On Designing Dependable Services with Diverse Off-The-Shelf SQL Servers. Springer, Heidelberg (2004)"},{"key":"27_CR9","unstructured":"Wang, R., Wang, F., Byrd, G.: Design and implementation of acceptance monitor for building scalable intrusion tolerant system. In: Proceedings of the 10th International Conference on Computer Communications and Networks (2001)"},{"issue":"2","key":"27_CR10","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1145\/226643.226647","volume":"43","author":"T. Chandra","year":"1996","unstructured":"Chandra, T., Toueg, S.: Unreliable failure detectors for reliable distributed systems. Journal of ACM\u00a043(2), 225\u2013267 (1996)","journal-title":"Journal of ACM"},{"key":"27_CR11","volume-title":"Delta-4: A Generic Architecture for Dependable Distributed Computing","author":"D. Powell","year":"1992","unstructured":"Powell, D.: Delta-4: A Generic Architecture for Dependable Distributed Computing. Springer, Heidelberg (1992)"},{"key":"27_CR12","volume-title":"Proceedings of the Nineteenth International Symposium on Fault-Tolerant Computing","author":"N. Speirs","year":"1989","unstructured":"Speirs, N., Barrett, P.: Using passive replicates in delta-4 to provide dependable distributed computing. In: Proceedings of the Nineteenth International Symposium on Fault-Tolerant Computing. IEEE, Los Alamitos (1989)"},{"key":"27_CR13","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/FTCSH.1995.532612","volume-title":"Proceedings of Twenty-Fifth International Symposium on Fault-Tolerant Computing","author":"D. Powell","year":"1995","unstructured":"Powell, D., Bonn, G., Seaton, D., Verissimo, P., Waeselynck, F.: The delta-4 approach to dependability in open distributed computing systems. In: Proceedings of Twenty-Fifth International Symposium on Fault-Tolerant Computing, p. 56. IEEE, Los Alamitos (1995)"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Deswarte, Y., Blain, L., Fabre, J.C.: Intrusion tolerance in distributed computing systems. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 110\u2013122 (1991)","DOI":"10.1109\/RISP.1991.130780"},{"key":"27_CR15","first-page":"110","volume-title":"Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems (SSRS 2003)","author":"A. Saidane","year":"2003","unstructured":"Saidane, A., Deswarte, Y., Nicomette, V.: An intrusion tolerant architecture for dynamic content internet servers. In: Liu, P., Pal, P. (eds.) Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems (SSRS 2003), Fairfax, VA, pp. 110\u2013114. ACM Press, New York (2003)"},{"key":"27_CR16","first-page":"158","volume-title":"Proceedings of the 10th International Workshop on Security Protocols","author":"A. Valdes","year":"2003","unstructured":"Valdes, A., Almgren, M., Cheung, S., Deswarte, Y., Dutertre, B., Levy, J., Saidi, H., Stavridou, V., Uribe, T.: An adaptative intrusion-tolerant server architecture. In: Proceedings of the 10th International Workshop on Security Protocols, pp. 158\u2013178. Springer, Heidelberg (2003)"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Yin, J., Martin, J.P., Venkataramani, A., Alvisi, L., Dahlin, M.: Separating agreement from execution for byzantine fault tolerant services. In: Proceedings of the 19th ACM Symp. on Operating Systems Principles (SOSP 2003) (2003)","DOI":"10.1145\/945469.945470"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Hurfin, M., Mac\u00eado, R., Raynal, M., Tronel, F.: A generic framework to solve agreement problems. In: Proc. of the 19 th IEEE Symposium on Reliable Distributed Systems (SRDS 1999), Lausanne, Switzerland, pp. 56\u201365 (1999)","DOI":"10.1109\/RELDIS.1999.805083"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Hurfin, M., Most\u00e9faoui, A., Raynal, M., Mac\u00eado, R.A.: A consensus protocol based on a weak failure detector and a sliding round window. In: 20th Symposium on Reliable Distributed Systems (SRDS 2001), pp. 120\u2013129 (2001)","DOI":"10.1109\/RELDIS.2001.969766"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-49823-0_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T22:12:51Z","timestamp":1737151971000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-49823-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540490180","9783540498230"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-49823-0_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}