{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:33:31Z","timestamp":1725518011172},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540855705"},{"type":"electronic","value":"9783540855712"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-85571-2_1","type":"book-chapter","created":{"date-parts":[[2008,8,25]],"date-time":"2008-08-25T03:58:47Z","timestamp":1219636727000},"page":"1-27","source":"Crossref","is-referenced-by-count":14,"title":["The CRUTIAL Architecture for Critical Information Infrastructures"],"prefix":"10.1007","author":[{"given":"Paulo","family":"Ver\u00edssimo","sequence":"first","affiliation":[]},{"given":"Nuno F.","family":"Neves","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[]},{"given":"Yves","family":"Deswarte","sequence":"additional","affiliation":[]},{"given":"A. Abou","family":"El Kalam","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Bondavalli","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Daidone","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Bessani, A.N., Sousa, P., Correia, M., Neves, N.F., Verissimo, P.: Intrusion-tolerant protection for critical infrastructures. DI\/FCUL TR 07\u20138, Department of Informatics, University of Lisbon (April 2007)"},{"issue":"4","key":"1_CR2","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1109\/TDSC.2004.40","volume":"11","author":"A. Bondavalli","year":"2004","unstructured":"Bondavalli, A., Chiaradonna, S., Cotroneo, D., Romano, L.: Effective fault treatment for improving the dependability of COTS- and legacy-based applications. IEEE Transactions on Dependable and Secure Computing\u00a011(4), 223\u2013237 (2004)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"3","key":"1_CR3","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1109\/12.841127","volume":"49","author":"A. Bondavalli","year":"2000","unstructured":"Bondavalli, A., Chiaradonna, S., Di Giandomenico, F., Grandoni, F.: Threshold-based mechanisms to discriminate transient from intermittent faults. IEEE Transactions on Computers\u00a049(3), 230\u2013245 (2000)","journal-title":"IEEE Transactions on Computers"},{"key":"1_CR4","unstructured":"Byres, E., Karsch, J., Carter, J.: NISCC good practice guide on firewall deployment for SCADA and process control networks. Technical report, NISCC, Revision 1.4 (February 2005)"},{"key":"1_CR5","unstructured":"North American Electric\u00a0Reliability Council. Urgent action standard 1200 (2003)"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Daidone, A., Di Giandomenico, F., Bondavalli, A., Chiaradonna, S.: Hidden Markov models as a support for diagnosis: Formalization of the problem and synthesis of the solution. In: 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), pp. 245\u2013256 (October 2006)","DOI":"10.1109\/SRDS.2006.24"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D., Chandramouli, R.: A proposed standard for role-based access control. ACM Transactions on Information and System Security\u00a04(3) (2001)","DOI":"10.1145\/501978.501980"},{"key":"1_CR8","first-page":"79","volume":"5","author":"L. Gong","year":"1995","unstructured":"Gong, L., Lincoln, P., Rushby, J.: Byzantine agreement with authentication: Observations and applications in tolerating hybrid and link faults. Dependable Computing for Critical Applications, IFIP WG 10.4, preliminary proceedings\u00a05, 79\u201390 (1995)","journal-title":"Dependable Computing for Critical Applications, IFIP WG 10.4, preliminary proceedings"},{"issue":"8","key":"1_CR9","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M.A. Harrison","year":"1976","unstructured":"Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Communications of the ACM\u00a019(8), 461\u2013471 (1976)","journal-title":"Communications of the ACM"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"El Kalam, A.A., Deswarte, Y., Baina, A., Kaaniche, M.: Access control for collaborative systems: A web services based approach. In: Proceedings of the IEEE International Conference on Web Services, pp. 1064\u20131071 (2007)","DOI":"10.1109\/ICWS.2007.30"},{"key":"1_CR11","unstructured":"El Kalam, A.A., Elbaida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Mi\u00e9ge, A., Saurel, C., Trouessin, G.: Organization-based access control. In: IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp. 277\u2013288 (June 2003)"},{"key":"1_CR12","unstructured":"Kilman, D., Stamp, J.: Framework for SCADA security policy. Technical report, Sandia Corporation (2005)"},{"volume-title":"Foundations of Intrusion Tolerant Systems","year":"2003","key":"1_CR13","unstructured":"Lala, J.H. (ed.): Foundations of Intrusion Tolerant Systems. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Mongardi, G.: Dependable computing for railway control systems. In: Proceedings of the International Conference on Dependable Computing for Critical Applications, pp. 255\u2013277 (1993)","DOI":"10.1007\/978-3-7091-4009-3_11"},{"key":"1_CR15","unstructured":"International\u00a0Standards Organization. ISO\/IEC Standard 15408-1, Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and general model 3 (July 2005)"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Pizza, M., Strigini, L., Bondavalli, A., Di Giandomenico, F.: Optimal discrimination between transient and permanent faults. In: Proceedings of the 3rd IEEE High Assurance System Engineering Symposium, pp. 214\u2013223 (1998)","DOI":"10.1109\/HASE.1998.731615"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Romano, L., Bondavalli, A., Chiaradonna, S., Cotroneo, D.: Implementation of threshold-based diagnostic mechanisms for COTS-based applications. In: Proceedings of the 21st IEEE Symposium on Reliable Distributed Systems, pp. 296\u2013303, October 13-16 (2002)","DOI":"10.1109\/RELDIS.2002.1180200"},{"issue":"4","key":"1_CR18","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1109\/TDSC.2007.70210","volume":"4","author":"M. Serafini","year":"2007","unstructured":"Serafini, M., Bondavalli, A., Suri, N.: Online diagnosis and recovery: On the choice and impact of tuning parameters. IEEE Transactions on Dependable and Secure Computing\u00a04(4), 295\u2013312 (2007)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Siewiorek, D.P., Swartz, R.S.: Reliable Computer Systems: Design and Evaluation. A.K. Peters (1998)","DOI":"10.1201\/9781439863961"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Sousa, P., Neves, N.F., Verissimo, P.: How resilient are distributed f fault\/intrusion-tolerant systems? In: Proceedings of the IEEE International Conference on Dependable Systems and Networks (June 2005)","DOI":"10.1109\/DSN.2005.55"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Thomas, R., Sandhu, R.: Task-based authorization controls. In: Proceedings of the 11th IFIP Working Conference on Database Security, pp. 166\u2013181 (1997)","DOI":"10.1007\/978-0-387-35285-5_10"},{"issue":"4","key":"1_CR22","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2006.95","volume":"4","author":"P. Verissimo","year":"2006","unstructured":"Verissimo, P., Neves, N.F., Cachin, C., Poritz, J., Powell, D., Deswarte, Y., Stroud, R., Welch, I.: Intrusion-tolerant middleware: The road to automatic security. IEEE Security & Privacy\u00a04(4), 54\u201362 (2006)","journal-title":"IEEE Security & Privacy"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Verissimo, P., Neves, N.F., Correia, M.: The CRUTIAL reference critical information infrastructure architecture: A blueprint. International Journal of System of Systems Engineering (to appear, 2008)","DOI":"10.1504\/IJSSE.2008.018132"},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48749-2","volume-title":"Secure Internet Programming","author":"J. Vitek","year":"1999","unstructured":"Vitek, J., Jensen, C.: A view-based access control model for CORBA. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol.\u00a01603. Springer, Heidelberg (1999)"},{"key":"1_CR25","unstructured":"W3C. SOAP, version 1.2. W3C Recommendation (June 2003)"},{"key":"1_CR26","unstructured":"W3C. Extensible markup language (XML). W3C Recommendation (February 2004)"},{"key":"1_CR27","unstructured":"W3C. WSDL, version 2.0. W3C Candidate Recommendation (March 2006)"},{"issue":"11","key":"1_CR28","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1109\/32.637385","volume":"23","author":"C.J. Walter","year":"1997","unstructured":"Walter, C.J., Lincoln, P., Suri, N.: Formally verified on-line diagnosis. IEEE Transactions Software Engineering\u00a023(11), 684\u2013721 (1997)","journal-title":"IEEE Transactions Software Engineering"}],"container-title":["Lecture Notes in Computer Science","Architecting Dependable Systems V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85571-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T11:33:10Z","timestamp":1557747190000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85571-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540855705","9783540855712"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85571-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}