{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:23:25Z","timestamp":1773840205553,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2005,2,1]],"date-time":"2005-02-01T00:00:00Z","timestamp":1107216000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJIS"],"published-print":{"date-parts":[[2005,2]]},"DOI":"10.1007\/s10207-004-0068-2","type":"journal-article","created":{"date-parts":[[2005,2,2]],"date-time":"2005-02-02T12:26:42Z","timestamp":1107347202000},"page":"105-119","source":"Crossref","is-referenced-by-count":18,"title":["Detection of file-based race conditions"],"prefix":"10.1007","volume":"4","author":[{"given":"Kyung-suk","family":"Lhee","sequence":"first","affiliation":[]},{"given":"Steve J.","family":"Chapin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,2,1]]},"reference":[{"key":"68_CRbishop","first-page":"131","volume":"9","author":"Bishop","year":"1996","unstructured":"Bishop M, Dilger M (1996) Checking for race conditions in file accesses. Comput Syst 9(2):131\u2013152","journal-title":"Comput Syst"},{"key":"68_CRbishopbook","first-page":"art","volume":"security","author":"Bishop","year":"2003","unstructured":"Bishop M (2003) Computer security: art and science. Addison-Wesley, Reading, MA","journal-title":"Computer"},{"key":"68_CRalias","doi-asserted-by":"crossref","unstructured":"Chakaravarthy VT (2003) New results on the computability and complexity of points-to analysis. In: Proceedings of the 30th ACM symposium on principles of programming languages, New Orleans, LA, January 2003, pp 115\u2013125","DOI":"10.1145\/640128.604142"},{"key":"68_CRchess","doi-asserted-by":"crossref","unstructured":"Chess BV (2002) Improving computer security using extended static checking. In: IEEE symposium on security and privacy, Berkeley, CA, May 2002, pp 160\u2013173","DOI":"10.1109\/SECPRI.2002.1004369"},{"key":"68_CRraceguard","unstructured":"Cowan C, Beattie S, Wright C, Kroah-Hartman G (2001) RaceGuard: kernel protection from temporary file race vulnerabilities. In: Proceedings of the 10th USENIX symposium on security, Washington, DC, August 2001"},{"key":"68_CRsyscall","doi-asserted-by":"crossref","unstructured":"Forrest S, Hofmeyr SA, Somayaji A, Longstaff TA (1996) A sense of self for Unix processes. In: Proceedings of the IEEE symposium on security and privacy, Oakland, CA, May 1996, pp 120\u2013128","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"68_CRai","unstructured":"Frank J (1994), Artificial intelligence and intrusion detection: current and future directions. In: Proceedings of the 17th conference on national computer security, Baltimore, MD, pp 22\u201333"},{"key":"68_CRilgun","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1109\/32.372146","volume":"21","author":"Ilgun","year":"1995","unstructured":"Ilgun K, Kemmerer RA, Porras PA (1995) State transition analysis: a rule-based intrusion detection approach. IEEE Trans Softw Eng 21(3):181\u2013199","journal-title":"IEEE Trans Softw Eng"},{"key":"68_CRexecmonitor","doi-asserted-by":"crossref","unstructured":"Ko C, Fink G, Levitt K (1994) Automated detection of vulnerabilities in privileged programs by execution monitoring. In: Proceedings of the IEEE symposium on security and privacy, pp 134\u2013144","DOI":"10.1109\/CSAC.1994.367313"},{"key":"68_CRnoninterference","doi-asserted-by":"crossref","unstructured":"Ko C, Redmond T (2002) Noninterference and intrusion detection. In: Proceedings of the IEEE symposium on security and privacy, Berkeley, CA, May 2002, pp 177\u2013187","DOI":"10.1109\/SECPRI.2002.1004370"},{"key":"68_CRkumar","unstructured":"Kumar S, Spafford EH (1994) A pattern matching model for misuse intrusion detection. In: Proceedings of the 17th conference on national computer security, pp 11\u201321"},{"key":"68_CRopenwall","unstructured":"Linux kernel patch from the Openwall Project (2003) http:\/\/www.openwall.com\/linux\/"},{"key":"68_CRides","doi-asserted-by":"crossref","unstructured":"Lunt TF, Jagannathan R (1988) A prototype real-time intrusion-detection expert system. In: Proceedings of the IEEE symposium on security and privacy, Oakland, CA, April 1988, pp 59\u201366","DOI":"10.1109\/SECPRI.1988.8098"},{"key":"68_CRscheifler","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1145\/22949.24053","volume":"5","author":"Scheifler","year":"1987","unstructured":"Scheifler RW, Gettys J (1987) The X Window System. ACM Trans Graph 5(2):79\u2013109","journal-title":"ACM Trans Graph"},{"key":"68_CRbehabmonitor","unstructured":"Sekar R, Bowen T, Segal M (1999) On preventing intrusions by process behavior monitoring. In: Workshop on intrusion detection and network monitoring, pp 29-40"},{"key":"68_CRstevens","unstructured":"Stevens WR (1992) Advanced programming in the UNIX environment. Addison-Wesley, Reading, MA"},{"key":"68_CRsun","first-page":"Rdist","volume":"pages","author":"Sun","year":"1993","unstructured":"Sun Microsystems (1993) Man pages: Rdist \u2013 remote file distribution program","journal-title":"Man"},{"key":"68_CRinductive","doi-asserted-by":"crossref","unstructured":"Teng HS, Chen K, Lu S C-Y (1990) Adaptive real-time anomaly detection using inductively generated sequential patterns. In: Proceedings of the IEEE symposium on security and privacy, Oakland, CA, May 1990, pp 278\u2013284","DOI":"10.1109\/RISP.1990.63857"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-004-0068-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-004-0068-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-004-0068-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T11:01:21Z","timestamp":1559127681000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-004-0068-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,2]]},"references-count":18,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2005,2]]}},"alternative-id":["68"],"URL":"https:\/\/doi.org\/10.1007\/s10207-004-0068-2","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,2]]}}}