{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T12:38:13Z","timestamp":1762605493309,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540407270"},{"type":"electronic","value":"9783540451778"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-45177-3_1","type":"book-chapter","created":{"date-parts":[[2007,7,31]],"date-time":"2007-07-31T05:05:12Z","timestamp":1185858312000},"page":"3-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":89,"title":["Intrusion-Tolerant Architectures: Concepts and Design"],"prefix":"10.1007","author":[{"given":"Paulo Esteves","family":"Ver\u00edssimo","sequence":"first","affiliation":[]},{"given":"Nuno Ferreira","family":"Neves","sequence":"additional","affiliation":[]},{"given":"Miguel Pupo","family":"Correia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,7,31]]},"reference":[{"key":"1_CR1","unstructured":"Adelsbach, A., Alessandri, D., Cachin, C., Creese, S., Deswarte, Y., Kursawe, K., Laprie, J.C., Powell, D., Randell, B., Riordan, J., Ryan, P., Simmonds, W., Stroud, R., Ver\u00edssimo, P., Waidner, M., Wespi, A.: Conceptual Model and Architecture of MAFTIA. Project MAPTIA IST-1999-11583 deliverable D21. (2002) http:\/\/www.research.ec.org\/maftia\/deliverables\/D21_OnlinePDF.pdf ."},{"key":"1_CR2","unstructured":"Alvisi, L., Malkhi, D., Pierce, E., Reiter, M.K., Wright, R.N.: Dynamic Byzantine quorum systems. In: Proceedings of the IEEE International Conference on Dependable Systems and Networks. (2000) 283\u2013292"},{"key":"1_CR3","unstructured":"Amir, Y., Kim, Y., Nita-Rotaru, C., Schultz, J., Stanton, J., Tsudik, G.: Exploring robustness in group key agreement. In: Proceedings of the 21th IEEE International Conference on Distributed Computing Systems. (2001) 399\u2013408"},{"issue":"4","key":"1_CR4","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1109\/49.839937","volume":"18","author":"G. Ateniese","year":"2000","unstructured":"Ateniese, G., Steiner, M., Tsudik, G.: New multi-party authentication services and key agreement protocols. IEEE J. of Selected Areas on Communications 18 (2000)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"1_CR5","series-title":"Technical Report","volume-title":"Fundamental concepts of dependability","author":"A. Avizienis","year":"2001","unstructured":"Avizienis, A., Laprie, J.C., Randell, B.: Fundamental concepts of dependability. Technical Report 01145, LAAS-CNRS, Toulouse, France (2001)"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1145\/4221.214134","volume":"32","author":"G. Bracha","year":"1985","unstructured":"Bracha, G., Toueg, S.: Asynchronous consensus and broadcast protocols. Journal of the ACM 32 (1985) 824\u2013840","journal-title":"Journal of the ACM"},{"key":"1_CR7","unstructured":"Cachin, C., Correia, M., McCutcheon, T., Neves, N., Pfitzmann, B., Randell, B., Schunter, M., Simmonds, W., Stroud, R., Ver\u00edssimo, P., Waidner, M., Welch, I.: Service and Protocol Architecture for the MAFTIA Middleware. Project MAFTIA IST-1999-11583 deliverable D23. (2001) http:\/\/www.research.ec.org\/maftia\/deliverables\/D23final_OnlinePDF.pdf ."},{"key":"1_CR8","unstructured":"Cachin, C., Poritz, J.A.: Hydra: Secure replication on the internet. In: Proceedings of the International Conference on Dependable Systems and Networks. (2002)"},{"key":"1_CR9","first-page":"1","volume":"3","author":"R. Canetti","year":"1997","unstructured":"Canetti, R., Gennaro, R., Herzberg, A., Naor, D.: Proactive security: Long-term protection against break-ins. RSA CryptoBytes 3 (1997) 1\u20138","journal-title":"RSA CryptoBytes"},{"key":"1_CR10","unstructured":"Castro, M., Liskov, B.: Practical Byzantine fault tolerance. In: Proceedings of the Third Symposium on Operating Systems Design and Implementation. (1999)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Connelly, K., Chien, A.A.: Breaking the barriers: High performance security for high performance computing. In: Proc. New Security Paradigms Workshop. (2002)","DOI":"10.1145\/844102.844109"},{"key":"1_CR12","unstructured":"Correia, M., Lung, L.C., Neves, N.F., Ver\u00edssimo, P.: Efficient Byzantine-resilient reliable multicast on a hybrid failure model. In: Proceedings of the 21st IEEE Symposium on Reliable Distributed Systems. (2002) 2\u201311"},{"key":"1_CR13","unstructured":"Correia, M., Ver\u00edssimo, P., Neves, N.F.: The design of a COTS real-time distributed security kernel. In: Proceedings of the Fourth European Dependable Computing Conference. (2002) 234\u2013252"},{"key":"1_CR14","unstructured":"Cukier, M., Lyons, J., Pandey, P., Ramasamy, H.V., Sanders, W.H., Pal, P., Webber, F., Schantz, R., Loyall, J., Watro, R., Atighetchi, M., Gossett, J.: Intrusion tolerance approaches in ITUA (fast abstract). In: Supplement of the 2001 International Conference on Dependable Systems and Networks. (2001) 64\u201365"},{"key":"1_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/3-540-45474-8_6","volume-title":"4th Workshop on Recent Advances in Intrusion Detection","author":"H. Debar","year":"2001","unstructured":"Debar, H., Wespi, A.: Aggregation and correlation of intrusion detection alerts. In: 4th Workshop on Recent Advances in Intrusion Detection. Volume 2212 of Lecture Notes in Computer Science. Springer-Verlag (2001) 85\u2013103"},{"key":"1_CR16","unstructured":"Deswarte, Y., Blain, L., Fabre, J.C.: Intrusion tolerance in distributed computing systems. In: Proceedings of the 1991 IEEE Symposium on Research in Security and Privacy. (1991) 110\u2013121"},{"key":"1_CR17","unstructured":"Dobson, J., Randell, B.: Building reliable secure computing systems out of unreliable insecure components. In: Proceedings of the International Symposium on Security and Privacy, IEEE (1986) 187\u2013193"},{"key":"1_CR18","unstructured":"Dutertre, B., Crettaz, V., Stavridou, V.: Intrusion-tolerant Enclaves. In: Proceedings of the IEEE International Symposium on Security and Privacy. (2002)"},{"key":"1_CR19","unstructured":"Fraga, J.S., Powell, D.: A fault-and intrusion-tolerant file system. In: Proceedings of the 3rd International Conference on Computer Security. (1985) 203\u2013218"},{"key":"1_CR20","unstructured":"Hadzilacos, V., Toueg, S.: A modular approach to fault-tolerant broadcasts and related problems. Technical Report TR94-1425, Cornell University, Department of Computer Science (1994)"},{"key":"1_CR21","unstructured":"Hiltunen, M., Schlichting, R., Ugarte, C.A.: Enhancing survivability of security services using redundancy. In: Proceedings of the IEEE International Conference on Dependable Systems and Networks. (2001) 173\u2013182"},{"key":"1_CR22","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1145\/503339.503341","volume":"4","author":"K.P. Kihlstrom","year":"2001","unstructured":"Kihlstrom, K.P., Moser, L.E., Melliar-Smith, P.M.: The SecureRing group communication system. ACM Transactions on Information and System Security 4 (2001) 371\u2013406","journal-title":"ACM Transactions on Information and System Security"},{"key":"1_CR23","unstructured":"Knight, J., Heimbigner, D., Wolf, A., Carzaniga, A., Hill, J., Devanbu, P.: The Willow survivability architecture. In: Proceedings of the 4th Information Survivability Workshop. (2001)"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Malkhi, D., Reiter, M.K., Tulone, D., Ziskind, E.: Persistent objects in the Fleet system. In: Proceedings of the 2nd DARPA Information Survivability Conference and Exposition (DISCEX II). (2001)","DOI":"10.1109\/DISCEX.2001.932165"},{"issue":"2","key":"1_CR25","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1109\/71.89066","volume":"2","author":"F.J. Meyer","year":"1991","unstructured":"Meyer, F., Pradhan, D.: Consensus with dual failure modes. In: Proc. of the 17th IEEE International Symposium on Fault-Tolerant Computing. (1987) 214\u2013222","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"1_CR26","unstructured":"Nicomette, V., Deswarte, Y.: An Authorization Scheme for Distributed Object Systems. In: IEEE Symposium on Research in Privacy and Security. (1996) 31\u201340"},{"key":"1_CR27","unstructured":"Pfitzmann, B., Waidner, M.: A model for asynchronous reactive systems and its application to secure message transmission. In: Proceedings of the IEEE Symposium on Research in Security and Privacy. (2001) 184\u2013200"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Powell, D., Seaton, D., Bonn, G., Ver\u00edssimo, P., Waeselynk, F.: The Delta-4 approach to dependability in open distributed computing systems. In: Proceedings of the 18th IEEE International Symposium on Fault-Tolerant Computing. (1988)","DOI":"10.1109\/FTCS.1988.5327"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Powell, D., ed.: Delta-4: A Generic Architecture for Dependable Distributed Processing. Springer-Verlag (1991) Research Reports ESPRIT.","DOI":"10.1007\/978-3-642-84696-0"},{"key":"1_CR30","unstructured":"Powell, D.: Fault assumptions and assumption coverage. In: Proceedings of the 22nd IEEE International Symposium of Fault-Tolerant Computing. (1992)"},{"key":"1_CR31","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/3-540-60042-6_7","volume-title":"Theory and Practice in Distributed Systems","author":"M.K. Reiter","year":"1995","unstructured":"Reiter, M.K.: The Rampart toolkit for building high-integrity services. In: Theory and Practice in Distributed Systems. Volume 938 of Lecture Notes in Computer Science. Springer-Verlag (1995) 99\u2013110"},{"key":"1_CR32","unstructured":"Schneider, F.B.: The state machine approach: A tutorial. Technical Report TR86-800, Cornell University, Computer Science Department (1986)"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Ver\u00edssimo, P., Rodrigues, L.: Distributed Systems for System Architects. Kluwer Academic Publishers (2001)","DOI":"10.1007\/978-1-4615-1663-7"},{"key":"1_CR34","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1023\/A:1007949113722","volume":"12","author":"P. Ver\u00edssimo","year":"1997","unstructured":"Ver\u00edssimo, P., Rodrigues, L., Casimiro, A.: Cesiumspray: A precise and accurate global clock service for large-scale systems. Journal of Real-Time Systems 12 (1997) 243\u2013294","journal-title":"Journal of Real-Time Systems"},{"key":"1_CR35","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-37795-6_20","volume-title":"Future Directions in Distributed Computing","author":"P. Ver\u00edssimo","year":"2003","unstructured":"Ver\u00edssimo, P.: Uncertainty and predictability: Can they be reconciled? In: Future Directions in Distributed Computing. Springer-Verlag LNCS 2584 (2003) \u2014"},{"key":"1_CR36","unstructured":"Ver\u00edssimo, P., Casimiro, A., Fetzer, C.: The Timely Computing Base: Timely actions in the presence of uncertain timeliness. In: Proceedings of the International Conference on Dependable Systems and Networks. (2000) 533\u2013542"},{"key":"1_CR37","unstructured":"Xu, J., Randell, B., Romanovsky, A., Rubira, C., Stroud, R.J., Wu, Z.: Fault tolerance in concurrent object-oriented software through coordinated error recovery. In: Proceedings of the 25th IEEE International Symposium on Fault-Tolerant Computing. (1995) 499\u2013508"},{"key":"1_CR38","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1145\/571637.571638","volume":"20","author":"L. Zhou","year":"2002","unstructured":"Zhou, L., Schneider, F., van Renesse, R.: COCA: A secure distributed on-line certification authority. ACM Trans, on Computer Systems 20 (2002) 329\u2013368","journal-title":"ACM Trans, on Computer Systems"}],"container-title":["Lecture Notes in Computer Science","Architecting Dependable Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45177-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T00:49:59Z","timestamp":1737334199000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45177-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540407270","9783540451778"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/3-540-45177-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"31 July 2007","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}