{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:45:12Z","timestamp":1725551112420},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642121883"},{"type":"electronic","value":"9783642121890"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12189-0_39","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T22:11:05Z","timestamp":1270073465000},"page":"441-456","source":"Crossref","is-referenced-by-count":1,"title":["Availability Analysis of an IMS-Based VoIP Network System"],"prefix":"10.1007","author":[{"given":"Toshikazu","family":"Uemura","sequence":"first","affiliation":[]},{"given":"Tadashi","family":"Dohi","sequence":"additional","affiliation":[]},{"given":"Naoto","family":"Kaio","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","first-page":"317","volume-title":"Proceedings of 6th International Conference on Advanced Communication Technology (ICACT 2004)","author":"Y. Bai","year":"2004","unstructured":"Bai, Y., Vuong, S.: A survey of VoIP intrusions and intrusion detection systems. In: Proceedings of 6th International Conference on Advanced Communication Technology (ICACT 2004), pp. 317\u2013322. IEEE CS Press, Los Alamitos (2004)"},{"issue":"4","key":"39_CR2","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1002\/bltj.10085","volume":"8","author":"C.K. Chan","year":"2004","unstructured":"Chan, C.K., Pant, H.: Reliability and security modeling in upgrading wireless backbone networks. Bell Labs Technical Journal\u00a08(4), 39\u201353 (2004)","journal-title":"Bell Labs Technical Journal"},{"key":"39_CR3","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/RISP.1991.130780","volume-title":"Proceedings of 1991 IEEE Symposium on Research in Security and Privacy","author":"Y. Deswarte","year":"1991","unstructured":"Deswarte, Y., Blain, L., Fabre, J.C.: Intrusion tolerance in distributed computing systems. In: Proceedings of 1991 IEEE Symposium on Research in Security and Privacy, pp. 110\u2013121. IEEE CS Press, Los Alamitos (1991)"},{"issue":"2","key":"39_CR4","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/JPROC.2005.862320","volume":"94","author":"Y. Deswarte","year":"2006","unstructured":"Deswarte, Y., Powell, D.: Internet security: an intrusion torelance approach. Proceedings of the IEEE\u00a094(2), 432\u2013441 (2006)","journal-title":"Proceedings of the IEEE"},{"doi-asserted-by":"crossref","unstructured":"Goseva-Popstojanova, K., Wang, F., Wang, R., Gong, F., Vaidyanathan, K., Trivedi, K., Muthusamy, B.: Characterizing intrusion tolerant systems using a state transition model. In: DARPA Information Survivability Conference and Exposition (DISCEX II), vol.\u00a02, pp. 211\u2013221 (2001)","key":"39_CR5","DOI":"10.1109\/DISCEX.2001.932173"},{"key":"39_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/978-3-540-45214-0_9","volume-title":"Dependable Computing","author":"V. Guputa","year":"2003","unstructured":"Guputa, V., et al.: Dependability and performance evaluation of intrusion-tolerant server architectures. In: de Lemos, R., Weber, T.S., Camargo Jr., J.B. (eds.) LADC 2003. LNCS, vol.\u00a02847, pp. 81\u2013101. Springer, Heidelberg (2003)"},{"issue":"4","key":"39_CR7","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/32.588541","volume":"23","author":"E. Jonsson","year":"1997","unstructured":"Jonsson, E., Olovsson, T.: A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering\u00a023(4), 235\u2013245 (1997)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"2\/3","key":"39_CR8","doi-asserted-by":"crossref","first-page":"211","DOI":"10.3233\/JCS-1993-22-308","volume":"2","author":"B. Littlewood","year":"1993","unstructured":"Littlewood, B., Brocklehurst, S., Fenton, N., Mellor, P., Page, S., Wright, D., Doboson, J., McDermid, J., Gollmann, D.: Towards operational measures of computer security. Journal of Computer Security\u00a02(2\/3), 211\u2013229 (1993)","journal-title":"Journal of Computer Security"},{"key":"39_CR9","first-page":"311","volume-title":"Proceedings of 18th Annual Computer Security Applications Conference (ACSAC 2002)","author":"P. Liu","year":"2002","unstructured":"Liu, P.: Architectures for intrusion tolerant database systems. In: Proceedings of 18th Annual Computer Security Applications Conference (ACSAC 2002), pp. 311\u2013320. IEEE CS Press, Los Alamitos (2002)"},{"issue":"3","key":"39_CR10","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1023\/B:JIIS.0000047394.02444.8d","volume":"23","author":"P. Liu","year":"2004","unstructured":"Liu, P., Jing, J., Luenam, P., Wang, Y., Li, L., Ingsriswang, S.: The design and implementation of a self-healing database system. Journal of Intelligent Information Systems\u00a023(3), 247\u2013269 (2004)","journal-title":"Journal of Intelligent Information Systems"},{"key":"39_CR11","first-page":"505","volume-title":"Proceedings of 32nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2002)","author":"B.B. Madan","year":"2002","unstructured":"Madan, B.B., Goseva-Popstojanova, K., Vaidyanathan, K., Trivedi, K.S.: Modeling and quantification of security attributes of software systems. In: Proceedings of 32nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2002), pp. 505\u2013514. IEEE CS Press, Los Alamitos (2002)"},{"issue":"1\/4","key":"39_CR12","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.peva.2003.07.008","volume":"56","author":"B.B. Madan","year":"2004","unstructured":"Madan, B.B., Goseva-Popstojanova, K., Vaidyanathan, K., Trivedi, K.S.: A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation\u00a056(1\/4), 167\u2013186 (2004)","journal-title":"Performance Evaluation"},{"issue":"5","key":"39_CR13","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1109\/32.815323","volume":"25","author":"R. Ortalo","year":"1999","unstructured":"Ortalo, R., Deswarte, Y., Kaaniche, M.: Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering\u00a025(5), 633\u2013650 (1999)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"39_CR14","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1002\/bltj.20190","volume":"11","author":"H. Pant","year":"2006","unstructured":"Pant, H., McGee, A.R., Chandrashekhar, U., Richman, S.H.: Optimal availability and security for IMS-based VoIP networks. Bell Labs Technical Journal\u00a011(3), 211\u2013223 (2006)","journal-title":"Bell Labs Technical Journal"},{"key":"39_CR15","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/DSN.2006.73","volume-title":"Proceedings of 36th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2006)","author":"H. Sengar","year":"2006","unstructured":"Sengar, H., Wijesekera, D., Wang, H., Jajodia, S.: VoIP intrusion detection through interacting protocol state machines. In: Proceedings of 36th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2006), pp. 393\u2013402. IEEE CS Press, Los Alamitos (2006)"},{"key":"39_CR16","first-page":"615","volume-title":"Proceedings of 33rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2003)","author":"S. Singh","year":"2003","unstructured":"Singh, S., Cukier, M., Sanders, W.H.: Probabilistic validation of an intrusion tolerant replication system. In: Proceedings of 33rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2003), pp. 615\u2013624. IEEE CS Press, Los Alamitos (2003)"},{"key":"39_CR17","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/RELDIS.2004.1353019","volume-title":"Proceedings of 23rd IEEE Reliable Distributed Systems Symposium (SRDS 2004)","author":"F. Stevens","year":"2004","unstructured":"Stevens, F., Courtney, T., Singh, S., Agbaria, A., Meyer, J.F., Sanders, W.H., Pal, P.: Model-based validation of an intrusion-tolerant information system. In: Proceedings of 23rd IEEE Reliable Distributed Systems Symposium (SRDS 2004), pp. 184\u2013194. IEEE CS Press, Los Alamitos (2004)"},{"key":"39_CR18","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1109\/DSN.2004.1311915","volume-title":"Proceedings of 34th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2004)","author":"R. Stroud","year":"2004","unstructured":"Stroud, R., Welch, I., Warne, J., Ryan, P.: A qualitative analysis of the intrusion-tolerant capabilities of the MAFTIA architecture. In: Proceedings of 34th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2004), pp. 453\u2013461. IEEE CS Press, Los Alamitos (2004)"},{"key":"39_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-77090-9_4","volume-title":"Emerging Directions in Embedded and Ubiquitous Computing","author":"T. Uemura","year":"2007","unstructured":"Uemura, T., Dohi, T.: Quantitative evaluation of intrusion tolerant systems subject to DoS attacks via semi-Markov cost models. In: Denko, M.K., Shih, C.-s., Li, K.-C., Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.-H. (eds.) EUC-WS 2007. LNCS, vol.\u00a04809, pp. 31\u201342. Springer, Heidelberg (2007)"},{"key":"39_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-540-68129-8_5","volume-title":"Service Availability","author":"T. Uemura","year":"2008","unstructured":"Uemura, T., Dohi, T.: Optimizing security measures in an intrusion tolerant database system. In: Nanya, T., Maruyama, F., Pataricza, A., Malek, M. (eds.) ISAS 2008. LNCS, vol.\u00a05017, pp. 26\u201342. Springer, Heidelberg (2008)"},{"unstructured":"Uemura, T., Dohi, T.: Optimal security patch management policies maximizing system availability. Journal of Communications (to appear)","key":"39_CR21"},{"key":"39_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/3-540-45177-3_1","volume-title":"Architecting Dependable Systems","author":"P.E. Verissimo","year":"2003","unstructured":"Verissimo, P.E., Neves, N.F., Correia, M.: Intrusion-tolerant architectures: concepts and design. In: de Lemos, R., Gacek, C., Romanovsky, A. (eds.) Architecting Dependable Systems. LNCS, vol.\u00a02677, pp. 3\u201336. Springer, Heidelberg (2003)"},{"issue":"4","key":"39_CR23","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2006.95","volume":"4","author":"P.E. Verissimo","year":"2006","unstructured":"Verissimo, P.E., Neves, N.F., Cachin, C., Poritz, J., Powell, D., Deswarte, Y., Stroud, R., Welch, I.: Intrusion-tolerant middleware. IEEE Security and Privacy\u00a04(4), 54\u201362 (2006)","journal-title":"IEEE Security and Privacy"},{"unstructured":"Wang, F., Gong, F., Sargor, C., Goseva-Popstojanova, K., Trivedi, K., Jou, F.: SITAR: A scalable intrusion-tolerant architecture for distributed services. In: Proceedings of 2nd Annual IEEE Systems, Man and Cybernetics, Information Assurance Workshop, West Point, NY (June 2001)","key":"39_CR24"},{"key":"39_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11863908_14","volume-title":"Computer Security \u2013 ESORICS 2006","author":"H. Wang","year":"2006","unstructured":"Wang, H., Liu, P.: Modeling and evaluating the survivability of an intrusion tolerant database system. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.\u00a04189, pp. 207\u2013224. Springer, Heidelberg (2006)"},{"key":"39_CR26","first-page":"433","volume-title":"Proceedings of 34th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2004)","author":"Y.-S. Wu","year":"2004","unstructured":"Wu, Y.-S., Bagchi, S., Garg, S., Singh, N., Tsai, T.: SCIDIVE: a stateful and cross protocol intrusion detection architecture for voice-over-IP environments. In: Proceedings of 34th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2004), pp. 433\u2013442. IEEE CS Press, Los Alamitos (2004)"},{"key":"39_CR27","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1109\/ICDCS.2004.1281607","volume-title":"Proceedings of 24th International Conference on Distributed Computing Systems (ICDCS 2004)","author":"M. Yu","year":"2004","unstructured":"Yu, M., Liu, P., Zang, W.: Self-healing workflow systems under attacks. In: Proceedings of 24th International Conference on Distributed Computing Systems (ICDCS 2004), pp. 418\u2013425. IEEE CS Press, Los Alamitos (2004)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12189-0_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T17:44:59Z","timestamp":1685555099000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12189-0_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642121883","9783642121890"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12189-0_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}