{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T05:30:14Z","timestamp":1735709414513,"version":"3.32.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2005,7,1]],"date-time":"2005-07-01T00:00:00Z","timestamp":1120176000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2005,7]]},"DOI":"10.1007\/s11227-005-0224-0","type":"journal-article","created":{"date-parts":[[2005,4,28]],"date-time":"2005-04-28T12:52:28Z","timestamp":1114692748000},"page":"103-121","source":"Crossref","is-referenced-by-count":0,"title":["PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label"],"prefix":"10.1007","volume":"33","author":[{"given":"D. S.","family":"Kim","sequence":"first","affiliation":[]},{"given":"Y. J.","family":"Jung","sequence":"additional","affiliation":[]},{"given":"T. M.","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"CR1","unstructured":"Aberdeen Group, Vulnerability Assessment: Empowering IS to Manage Actual Risk\u2013-An Executive White Paper, Aberdeen Group, Inc., Sep. 1997."},{"key":"CR2","unstructured":"E. Amoroso. Intrusion Detection\u2013-An Introduction to Internet Surveillance, Correlation, Traps, Trace Back, and Response. AT&T, Inc., 1999."},{"key":"CR3","unstructured":"An ISS White Paper, Internet Scanner 7.0 Technical Overview, Internet Security Systems, Inc., 2003."},{"key":"CR4","unstructured":"4yas Harry Anderson, Introduction to Nessus, http:\/\/www.securityfocus.com\/infocus\/1741, October 28, 2003."},{"key":"CR5","unstructured":"Harry Anderson, Nessus, Part 2: Scanning, http:\/\/www.securityfocus.com\/infocus\/1753, Dec. 16, 2003."},{"key":"CR6","doi-asserted-by":"crossref","unstructured":"R. G. Bace. Intrusion Detection, Macmillan Technical Publishing, 2000.","DOI":"10.6028\/NIST.SP.800-31"},{"key":"CR7","unstructured":"M. Bishop. Computer Security: Art and Science, Pearson Education, Inc., 2003."},{"key":"CR8","unstructured":"S. Brown. Implementing Virtual Private Networks 1st ed., McGraw-Hill, May 1, 1999."},{"key":"CR9","unstructured":"D. B. Chapman and E. D. Zwicky. Building Internet Firewalls, O\u2019Reilly & Associations, Inc., Jan. 1996."},{"key":"CR10","unstructured":"Check Point OPSEC SDK Version 4.1 Release Notes, Check Point Software Technology, Inc., Nov. 2, 1999."},{"key":"CR11","unstructured":"Check Point VPN-1\/Firewall-1 OPSEC API Specification Version 4.1, Check Point Software Technology, Inc., Nov. 4, 1999."},{"key":"CR12","unstructured":"W. R. Cheswick and S. M. Bellovin. Firewalls and Internet Security\u2013-Repelling the Willy Hacker, Addison Wesley, 1994."},{"key":"CR13","unstructured":"CSE MG-1: Network Security\u2013-Analysis and Implementation, Communications Security Establishment (CSE), Jan. 1996."},{"key":"CR14","unstructured":"CSE MG-2: A Guide to Security Risk Management for Information Technology Systems, Communications Security Establishment (CSE), Jan. 1996."},{"key":"CR15","unstructured":"CSE MG-3: A Guide to Risk Assessment and Safeguard Selection for Information Technology Systems, Communications Security Establishment (CSE), Jan. 1996."},{"key":"CR16","unstructured":"CSE ITSG-04: Threat and Risk Assessment Working Guide, Communications Security Establishment (CSE), Jan. 1996."},{"key":"CR17","unstructured":"D. E. Denning. Information Warfare and Security, ACM Press, 1999."},{"key":"CR18","unstructured":"D. Gollmann. Computer Security, John Wiley & Sons, Inc., Jul. 2001."},{"key":"CR19","unstructured":"C. Hare and K. Siyan. Internet Firewalls and Network Security, 2nd ed. New Riders Publishing, 1996."},{"key":"CR20","unstructured":"E. J. Humphreyes, R. H. Moses, and A. E. Plate. Guide to Risk Assessment and Risk Management, BSI, London, 1998."},{"key":"CR21","unstructured":"ISO\/IEC TR 13335-1. Information Technology\u2013Guidelines for the management of IT security\u2013Part 1: Concepts and models for IT Security (1st ed.), 1996."},{"key":"CR22","unstructured":"ISO\/IEC TR 13335-2. Information Technology\u2013-Guidelines for the Management of IT Security\u2013Part 2: Managing and planning IT security (1st ed.), 1997."},{"key":"CR23","unstructured":"ISO\/IEC TR 13335-3. Information Technology\u2013-Guidelines for the Management of IT Security\u2013Part 3: Techniques for the management of IT Security, 1998."},{"key":"CR24","unstructured":"C. Kaufman, R. Perlman, and M. Speciner. Network Security: PRIVATE Communication in a PUBLIC World, Prentice Hall PTR, 1995."},{"key":"CR25","unstructured":"D. Y. Lee, D. S. Kim, K. H. Pang, H. S. Kim, and T. M. Chung. A Design of Scalable SNMP Agent for Managing Heterogeneous Security Systems, NOMS2000, 10-15 Apr. 2000."},{"key":"CR26","first-page":"12","volume":"1","author":"S. M. Lewandowski","year":"June 2001","unstructured":"S. M. Lewandowski, D. J. Van Hook, G. C. O\u2019Leary, J. W. Haines, and L. M. Rossey. SARA: Survivable Autonomic Response Architecture, DARPA Information Survivability Conference & Exposition II, DISCEX \u201801 Proceedings, June 2001, Vol. 1, 12\u201314.","journal-title":"SARA: Survivable Autonomic Response Architecture, DARPA Information Survivability Conference & Exposition II, DISCEX \u201801 Proceedings"},{"key":"CR27","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-3458-4","volume-title":"Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint","author":"D. J. Marchette","year":"2001","unstructured":"D. J. Marchette. Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint, Springer-Verlag, New York, Inc., 2001."},{"key":"CR28","unstructured":"S. McClure, J. Scambray, and G. Kurtz. Hacking Exposed\u2013-Network Security Secrets & Solutions, McGraw-Hill Companies, 1999."},{"key":"CR29","unstructured":"S. Northcult. Network Intrusion Detection\u2013-An Analyst\u2019s Handbook, New Riders Publishing, 1999."},{"key":"CR30","unstructured":"S. Northcutt, L. Zelster, S. Winters, K. Frederick, and R. Ritchey. Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems, New Riders Publishing, Jun. 28, 2002."},{"key":"CR31","unstructured":"Open Platform for Security (OPSEC) Technical Note, Check Point Software Technology, Inc., 2000."},{"key":"CR32","unstructured":"C. P. Pfleeger and S. L. Pfleeger. Security in Computing 3rd ed. Pearson Education, Inc., 2003."},{"key":"CR33","doi-asserted-by":"crossref","unstructured":"D. Schnackengerg, K. Djahandari, D. Sterne, Infrastructure for intrusion detection and response, DARPA Information Survivability Conference and Exposition, DISCEX \u201800. Proceedings, 2000, Vol. 2.","DOI":"10.1109\/DISCEX.2000.821505"},{"key":"CR34","doi-asserted-by":"crossref","unstructured":"D. Schnackengerg, H. Holliday, R. Smith, Kelly Djahandari, and Dan Sterne. Cooperative Intrusion Traceback and Response Architecture (CITRA), DARPA Information Survivability Conference & Exposition II, DISCEX \u201801. Proceedings, 2001, Vol. 1.","DOI":"10.1109\/DISCEX.2001.932192"},{"key":"CR35","unstructured":"C. Scott, P. Wolfe, and M. Erwin. Virtual Private Networks, 2nd ed. O\u2019Reilly & Associates, Dec. 1998."},{"key":"CR36","unstructured":"Secure Virtual Network Architecture: A Customer-focused White Paper, Check Point Software Technologies Ltd., Nov. 2000."},{"key":"CR37","doi-asserted-by":"crossref","unstructured":"D. Sterne, K. Djahandari, B. Wilson, B. Babson, D. Schnackenberg, H. Holliday, and T. Reid, Autonomic Response to distributed denial of service attacks, advanced security research journal, VI(I): 2002.","DOI":"10.1007\/3-540-45474-8_9"},{"key":"CR38","unstructured":"W. Stalling. Cryptography and Network Security: Principles and Practice, 2nd ed. Prentice-Hall, 1999."},{"key":"CR39","unstructured":"W. Stallings. Network Security Essentials: Applications and Standards, Prentice-Hall, Inc., 2000."},{"key":"CR40","doi-asserted-by":"crossref","unstructured":"D. Trcek. An integral framework for information systems security management. Computers & Security, 22(4): 2003.","DOI":"10.1016\/S0167-4048(03)00413-9"},{"key":"CR41","doi-asserted-by":"crossref","unstructured":"R. Venkateswaran. Virtual private networks. IEEE Potentials, 20(1), 2001.","DOI":"10.1109\/45.913204"},{"key":"CR42","unstructured":"R. L. Ziegler. Linux Firewalls, New Riders Publishing, 2000."}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-005-0224-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-005-0224-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-005-0224-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T23:39:30Z","timestamp":1735688370000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-005-0224-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,7]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2005,7]]}},"alternative-id":["224"],"URL":"https:\/\/doi.org\/10.1007\/s11227-005-0224-0","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2005,7]]}}}