{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:18:35Z","timestamp":1758892715789},"reference-count":40,"publisher":"Elsevier","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1016\/b978-0-12-396525-7.00005-8","type":"book-chapter","created":{"date-parts":[[2012,4,6]],"date-time":"2012-04-06T10:40:32Z","timestamp":1333708832000},"page":"141-167","source":"Crossref","is-referenced-by-count":4,"title":["Pragmatic Directions in Engineering Secure Dependable Systems"],"prefix":"10.1016","author":[{"given":"M. Farrukh","family":"Khan","sequence":"first","affiliation":[]},{"given":"Raymond A.","family":"Paul","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"9","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0005","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/2.84898","article-title":"High-availability computer systems","volume":"24","author":"Gray","year":"1991","journal-title":"Computer"},{"issue":"4","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0010","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/MC.2006.142","article-title":"Toward trustworthy software systems","volume":"39","author":"Hasselbring","year":"2006","journal-title":"Computer"},{"issue":"6","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0015","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/4236.807008","article-title":"Survivability: protecting your critical systems","volume":"3","author":"Ellison","year":"1999","journal-title":"Internet Comput. IEEE"},{"issue":"8","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0020","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1109\/TC.2011.119","article-title":"Guest editors\u2019 introduction: special section on science of design for safety critical systems","volume":"60","author":"Shukla","year":"2011","journal-title":"IEEE Trans. Comput."},{"issue":"010028","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0025","first-page":"7","article-title":"Fundamental concepts of dependability","volume":"1145","author":"Avizienis","year":"2001","journal-title":"Technical Report Series University of Newcastle upon Tyne Computing Science"},{"issue":"5","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0030","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1147\/rd.255.0453","article-title":"Reliability, availability, and serviceability of IBM computer systems: a quarter century of progress","volume":"25","author":"Hsiao","year":"1981","journal-title":"IBM J. Res. Dev."},{"issue":"3","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0035","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1016\/j.ijpe.2003.10.004","article-title":"Enterprise information systems project implementation: a case study of ERP in Rolls-Royce","volume":"87","author":"Yusuf","year":"2004","journal-title":"Int. J. Prod. Econ."},{"issue":"7","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0040","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/1364782.1364788","article-title":"In search of dependable design","volume":"51","author":"Hoffman","year":"2008","journal-title":"Commun. ACM"},{"issue":"6","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0045","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1038\/scientificamerican0611-48","article-title":"Planning for the black swan","volume":"304","author":"Piore","year":"2011","journal-title":"Sci. Am. Mag."},{"key":"10.1016\/B978-0-12-396525-7.00005-8_bb0050","first-page":"1","article-title":"Personal observations on the reliability of the shuttle","volume":"2","author":"Feynman","year":"1986","journal-title":"Report of the Presidential Commission on the Space Shuttle Challenger Accident"},{"issue":"2","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0055","doi-asserted-by":"crossref","first-page":"225","DOI":"10.2307\/2393390","article-title":"Autonomy, interdependence, and social control: NASA and the space shuttle challenger","volume":"35","author":"Vaughan","year":"1990","journal-title":"Adm. Sci. Q."},{"key":"10.1016\/B978-0-12-396525-7.00005-8_bb0060","series-title":"Network Security: Private Communication in a Public World","author":"Kaufman","year":"2002"},{"key":"10.1016\/B978-0-12-396525-7.00005-8_bb0065","author":"Christianson","year":"2009"},{"key":"10.1016\/B978-0-12-396525-7.00005-8_bb0070","series-title":"Handbook of Applied Cryptography","author":"Menezes","year":"1997"},{"issue":"10","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0075","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1038\/nphoton.2010.214","article-title":"Hacking commercial quantum cryptography systems by tailored bright illumination","volume":"4","author":"Lydersen","year":"2010","journal-title":"Nat. Photonics"},{"key":"10.1016\/B978-0-12-396525-7.00005-8_bb0080","series-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"Anderson","year":"2008"},{"key":"10.1016\/B978-0-12-396525-7.00005-8_bb0085","article-title":"Fail-stop protocols: an approach to designing secure protocols","author":"Gong","year":"1995"},{"key":"10.1016\/B978-0-12-396525-7.00005-8_bb0090","series-title":"Fast Software Encryption","first-page":"277","article-title":"Revisiting the IDEA Philosophy","author":"Junod","year":"2009"},{"key":"10.1016\/B978-0-12-396525-7.00005-8_bb0095","first-page":"1","article-title":"Why do Internet services fail, and what can be done about it?","author":"Oppenheimer","year":"2003"},{"key":"10.1016\/B978-0-12-396525-7.00005-8_bb0100","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/MIC.2010.136","article-title":"Cloud computing: the limits of public clouds for business applications","volume":"14","author":"Hofmann","year":"2010","journal-title":"IEEE Internet Comput."},{"key":"10.1016\/B978-0-12-396525-7.00005-8_bb0105","series-title":"Above the clouds: a Berkeley view of cloud computing","author":"Armbrust","year":"2009"},{"issue":"6","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0110","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/1466443.1466449","article-title":"Improving performance on the internet","volume":"6","author":"Leighton","year":"2008","journal-title":"Queue"},{"key":"10.1016\/B978-0-12-396525-7.00005-8_bb0115","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/978-3-642-21031-0_6","article-title":"Toward trustworthy clouds internet scale critical infrastructure","author":"Abbadi","year":"2011","journal-title":"Information Security Practice and Experience"},{"key":"10.1016\/B978-0-12-396525-7.00005-8_bb0120","series-title":"Network Security in the \u201990s: Issues and Solutions for Managers","author":"Madron","year":"1992"},{"issue":"8","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0125","doi-asserted-by":"crossref","first-page":"1245","DOI":"10.1016\/j.comnet.2010.03.005","article-title":"Resilience and survivability in communication networks: strategies, principles, and survey of disciplines","volume":"54","author":"Sterbenz","year":"2010","journal-title":"Comput. Network."},{"issue":"2","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0130","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MIC.2003.1189191","article-title":"Internet filtering in China","volume":"7","author":"Zittrain","year":"2003","journal-title":"IEEE Internet Comput."},{"key":"10.1016\/B978-0-12-396525-7.00005-8_bb0135","article-title":"Google's China problem (and China's Google problem)","author":"Thompson","year":"2006","journal-title":"The New York Times Magazine"},{"issue":"6","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0140","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1145\/1349026.1349043","article-title":"Information accountability","volume":"51","author":"Weitzner","year":"2008","journal-title":"Commun. ACM"},{"key":"10.1016\/B978-0-12-396525-7.00005-8_bb0145","series-title":"Inter-X: Resilience of the Internet Interconnection Ecosystem","author":"Hall","year":"2011"},{"key":"10.1016\/B978-0-12-396525-7.00005-8_bb0150","first-page":"1","article-title":"The cloud will change everything","author":"Larus","year":"2011"},{"key":"10.1016\/B978-0-12-396525-7.00005-8_bb0155","first-page":"17","article-title":"Public computing: reconnecting people to science","author":"Anderson","year":"2003"},{"key":"10.1016\/B978-0-12-396525-7.00005-8_bb0160","series-title":"CONCUR 2010\u2014Concurrency Theory","first-page":"48","article-title":"Trust in anonymity networks","author":"Sassone","year":"2011"},{"issue":"2","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0165","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","article-title":"Simple proof of security of the bb84 quantum key distribution protocol","volume":"85","author":"Shor","year":"2000","journal-title":"Phys. Rev. Lett."},{"key":"10.1016\/B978-0-12-396525-7.00005-8_bb0170","article-title":"Quantum key distribution and cryptography: a survey","author":"All\u00e9aume","year":"2010"},{"issue":"1","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0175","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/0305-0548(93)90093-X","article-title":"Design of reliable networks","volume":"20","author":"Jan","year":"1993","journal-title":"Comput. Operations Res."},{"issue":"2","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0180","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/TDSC.2004.15","article-title":"Checkpointing for peta-scale systems: a look into the future of practical rollback-recovery","volume":"1","author":"Elnozahy","year":"2004","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"4","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0185","doi-asserted-by":"crossref","first-page":"1204","DOI":"10.1109\/18.850663","article-title":"Network information flow","volume":"46","author":"Ahlswede","year":"2000","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"6","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0190","doi-asserted-by":"crossref","first-page":"2596","DOI":"10.1109\/TIT.2008.921711","article-title":"Resilient network coding in the presence of byzantine adversaries","volume":"54","author":"Jaggi","year":"2008","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"7","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0195","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1145\/1965724.1965740","article-title":"Dsl for the uninitiated","volume":"54","author":"Ghosh","year":"2011","journal-title":"Commun. ACM"},{"issue":"4","key":"10.1016\/B978-0-12-396525-7.00005-8_bb0200","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/1498765.1498787","article-title":"A direct path to dependable software","volume":"52","author":"Jackson","year":"2009","journal-title":"Commun. ACM"}],"container-title":["Advances in Computers","Dependable and Secure Systems Engineering"],"original-title":[],"deposited":{"date-parts":[[2018,11,24]],"date-time":"2018-11-24T02:53:04Z","timestamp":1543027984000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780123965257000058"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1016\/b978-0-12-396525-7.00005-8","relation":{},"ISSN":["0065-2458"],"issn-type":[{"value":"0065-2458","type":"print"}],"subject":[],"published":{"date-parts":[[2012]]}}}