{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:56:49Z","timestamp":1725562609287},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642147050"},{"type":"electronic","value":"9783642147067"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14706-7_23","type":"book-chapter","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T09:14:43Z","timestamp":1281518083000},"page":"298-306","source":"Crossref","is-referenced-by-count":2,"title":["Security and Scalability of Remote Entrusting Protection"],"prefix":"10.1007","author":[{"given":"Vasily","family":"Desnitsky","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Atallah, M., Bryant, E., Stytz, M.: A survey of Anti-Tamper Technologies. The Journal of Defence Software Engineering (2004)"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Barbara, D., Goel, R., Jajodia, S.: A checksum-based corruption detection technique. Journal of Computer Security\u00a011(3) (2003)","DOI":"10.3233\/JCS-2003-11303"},{"key":"23_CR3","unstructured":"Beshelev, S.D., Gurvich, A.G.: Mathematical-statistical methods for expert Judgments. Statistika (1980)"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0097921","volume-title":"Parallel and Distributed Processing","author":"B.L. Chappell","year":"1999","unstructured":"Chappell, B.L., Marlow, D.T., Irey, P.M., O\u2019Donoghue, K.: An Approach for Measuring IP Security Performance in a Distributed Environment. In: Rolim, J.D.P. (ed.) IPPS-WS 1999 and SPDP-WS 1999. LNCS, vol.\u00a01586. Springer, Heidelberg (1999)"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Ceccato, M., Preda, M., Majumdar, A., Tonella, P.: Remote software protection by orthogonal client replacement. In: The 24th ACM Symposium on Applied Computing (2009)","DOI":"10.1145\/1529282.1529380"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Ceccato, M., Preda, M., Nagra, J., Collberg, C., Tonella, P.: Barrier Slicing for Remote Software Trusting. In: The IEEE International Working Conference on Source Code Analysis and Manipulation, Paris, France (2007)","DOI":"10.1109\/SCAM.2007.27"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation tools for software protection. IEEE Transactions on Software Engineering\u00a028 (2002)","DOI":"10.1109\/TSE.2002.1027797"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Freeman, W., Miller, E.: An Experimental Analysis of Cryptographic Overhead in Performance-Critical Systems. In: The 7th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (1999)","DOI":"10.1109\/MASCOT.1999.805073"},{"key":"23_CR9","unstructured":"FP6 Project RE-TRUST, \n                    \n                      http:\/\/www.re-trust.org"},{"key":"23_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/978-3-642-03237-0_22","volume-title":"SAS 2009","author":"G. Godoy","year":"2009","unstructured":"Godoy, G., Tiwari, A.: Invariant Checking for Programs with Procedure Calls. In: Palsberg, J., Su, Z. (eds.) SAS 2009. LNCS, vol.\u00a05673, pp. 326\u2013342. Springer, Heidelberg (2009)"},{"key":"23_CR11","volume-title":"The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling","author":"R. Jain","year":"1991","unstructured":"Jain, R.: The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling. Wiley-Interscience, New York (1991)"},{"key":"23_CR12","unstructured":"Kennell, R., Jamieson, L.H.: Establishing the genuinity of remote computer systems. In: The 12th USENIX Security Symposium, Washington, DC, USA (2003)"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Menasce, D.A.: Security performance. IEEE Internet Computing\u00a07(3) (2003)","DOI":"10.1109\/MIC.2003.1200305"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Oh, N., Shirvani, P.P., McCluskey, E.J.: Control-flow checking by software signatures. IEEE Transactions on Reliability\u00a051 (2002)","DOI":"10.1109\/24.994926"},{"key":"23_CR15","volume-title":"The Twentieth ACM Symposium on Operating Systems Principles","author":"A. Seshadri","year":"2005","unstructured":"Seshadri, A., Luk, M., Shi, E., Perrig, A., Doorn, L.V., Khosla, P.: Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In: The Twentieth ACM Symposium on Operating Systems Principles. ACM Press, New York (2005)"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Perrig, A., Doorn, L.V., Khosla, P.: SWATT: SoftWare-based ATTestation for Embedded Devices. The IEEE Symposium on Security and Privacy (2004)","DOI":"10.1109\/SECPRI.2004.1301329"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14706-7_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:36:33Z","timestamp":1619786193000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14706-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147050","9783642147067"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14706-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}