{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T05:30:10Z","timestamp":1734067810178,"version":"3.30.2"},"reference-count":31,"publisher":"Elsevier BV","issue":"9","license":[{"start":{"date-parts":[[2003,6,1]],"date-time":"2003-06-01T00:00:00Z","timestamp":1054425600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[2003,6]]},"DOI":"10.1016\/s0950-5849(03)00049-1","type":"journal-article","created":{"date-parts":[[2003,6,2]],"date-time":"2003-06-02T23:15:45Z","timestamp":1054595745000},"page":"619-631","source":"Crossref","is-referenced-by-count":2,"title":["An architecture for security-oriented perfective maintenance of legacy software"],"prefix":"10.1016","volume":"45","author":[{"given":"D","family":"Cotroneo","sequence":"first","affiliation":[]},{"given":"A","family":"Mazzeo","sequence":"additional","affiliation":[]},{"given":"L","family":"Romano","sequence":"additional","affiliation":[]},{"given":"S","family":"Russo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"1990","series-title":"IEEE Standard Computer Dictionary: A Compilation of IEEE Standard Computer Glossaries","key":"10.1016\/S0950-5849(03)00049-1_BIB1"},{"key":"10.1016\/S0950-5849(03)00049-1_BIB2","series-title":"Computer Security, Dependability, and Assurance","article-title":"Diversity Against Accidental and Deliberate Faults","author":"Deswarte","year":"1999"},{"year":"1997","series-title":"Secure Electronic Commerce","author":"Ford","key":"10.1016\/S0950-5849(03)00049-1_BIB3"},{"year":"1997","series-title":"Internet Security Professional Reference","author":"Atkins","key":"10.1016\/S0950-5849(03)00049-1_BIB4"},{"key":"10.1016\/S0950-5849(03)00049-1_BIB5","unstructured":"http:\/\/www.linuxguruz.org\/iptables\/."},{"key":"10.1016\/S0950-5849(03)00049-1_BIB6","doi-asserted-by":"crossref","unstructured":"J.C. Laprie, Dependable computing and fault tolerance: concepts and terminology, Proceedings of 15th International Symposium on Fault Tolerant Computing, IEEE Computer Society, Ann Arbor, MI, 1985, pp. 2\u201311.","DOI":"10.1109\/FTCSH.1995.532603"},{"issue":"6","key":"10.1016\/S0950-5849(03)00049-1_BIB7","doi-asserted-by":"crossref","DOI":"10.1109\/71.774907","article-title":"Chameleon: a software infrastructure for adaptive fault tolerance","volume":"10","author":"Kalbarczyk","year":"1999","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"10.1016\/S0950-5849(03)00049-1_BIB8","doi-asserted-by":"crossref","unstructured":"L.E. Moser, P.M. Melliar-Smith, P. Narasimhan, L. Tewksbury V. Kalogeraki, The eternal system: an architecture for enterprise applications, Proceedings of International Enterprise Distributed Object Computing Conference, University of Mannheim, Germany, September 1999, pp. 214\u2013222.","DOI":"10.1109\/EDOC.1999.792065"},{"key":"10.1016\/S0950-5849(03)00049-1_BIB9","doi-asserted-by":"crossref","unstructured":"K.K. Goswami, R.K. Iyer, Simulation of software behavior under hardware faults, Proceedings of the 23rd Annual International Symposium on Fault-Tolerant Computing, Toulouse, France, June 1993.","DOI":"10.1109\/FTCS.1993.627325"},{"key":"10.1016\/S0950-5849(03)00049-1_BIB10","unstructured":"J.D. Howard, An Analysis of Security Incidents on the Internet, 1989\u20131995, April 1997, Pittsburgh, PA, USA. http:\/\/www.cert.org\/research\/JHThesis\/Start.html."},{"key":"10.1016\/S0950-5849(03)00049-1_BIB11","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/s005300050117","article-title":"A progressively reliable transport protocol for interactive wireless multimedia","volume":"7","author":"Han","year":"1999","journal-title":"Multimedia Systems"},{"key":"10.1016\/S0950-5849(03)00049-1_BIB12","doi-asserted-by":"crossref","unstructured":"M. Cukier D.A. Karr, P. Rubel, C. Sabnis, W.H. Sanders, R.E. Schantz, M. Seri, AQuA: an adaptive architecture that provides dependable distributed objects, IEEE Transactions on Computers, 52(1) (2003) 31\u201350.","DOI":"10.1109\/TC.2003.1159752"},{"key":"10.1016\/S0950-5849(03)00049-1_BIB13","doi-asserted-by":"crossref","unstructured":"R. Jiminez-Peris, M. Patino-Martinez, S. Arevalo, Deterministic scheduling for transactional multithreaded replicas, Proceedings of the 19th IEEE Symposium on Reliable Distributed Systems (SRDS-2000), pp. 164\u2013173.","DOI":"10.1109\/RELDI.2000.885404"},{"issue":"3","key":"10.1016\/S0950-5849(03)00049-1_BIB14","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1088\/0967-1846\/4\/3\/003","article-title":"Replica consistency of objects in partitionable distributed systems","volume":"4","author":"Narasimhan","year":"1997","journal-title":"Distributed Systems Engineering"},{"key":"10.1016\/S0950-5849(03)00049-1_BIB16","doi-asserted-by":"crossref","unstructured":"P. Felber, R. Guerraoui, A. Schiper, The implementation of a object group service, in Theory and Practise of Object Systems (TAPOS), New York: Wiley, 1998, No. 2.","DOI":"10.1002\/(SICI)1096-9942(1998)4:2<93::AID-TAPO4>3.0.CO;2-8"},{"key":"10.1016\/S0950-5849(03)00049-1_BIB17","doi-asserted-by":"crossref","unstructured":"K. Birman, R. Constable, M. Hayden, C. Kreitz, O. Rodeh, R. van Renesse, W. Vogels, The horus and ensemble projects: accomplishments and limitations, Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX '00), Hilton Head, South Carolina, January 25\u201327, 2000.","DOI":"10.1109\/DISCEX.2000.824975"},{"key":"10.1016\/S0950-5849(03)00049-1_BIB18","doi-asserted-by":"crossref","unstructured":"D.E. Bakken, Z. Zhan, C.C. Jones, D.A. Karr, Middleware support for voting and data fusion, The 2001 International Conference on Dependable Systems and Networks, IEEE-CS, 2001, pp. 453\u2013462.","DOI":"10.1109\/DSN.2001.941429"},{"key":"10.1016\/S0950-5849(03)00049-1_BIB19","unstructured":"Institute for Applied Information Processing and Communications, March 2001. http:\/\/jcewww.iaik.tu-graz.ac.at\/jce\/jce.htm."},{"key":"10.1016\/S0950-5849(03)00049-1_BIB20","unstructured":"IONA Technologies PLC, Orbix 2000 SSL\/TLS Programmer's Guide, December 2000, available on http:\/\/www.iona.com."},{"key":"10.1016\/S0950-5849(03)00049-1_BIB21","doi-asserted-by":"crossref","unstructured":"R. Housley, W. Ford, W. Polk, D. Solo, Internet X.509 Public Key Infrastructure Certificate and CRL Profile, RFC 2459, January 1999.","DOI":"10.17487\/rfc2459"},{"key":"10.1016\/S0950-5849(03)00049-1_BIB22","unstructured":"IONA Technologies PLC, Orbix 2000 Programmer's Guide Java Edition, December 2000, available on http:\/\/www.iona.com."},{"key":"10.1016\/S0950-5849(03)00049-1_BIB23","unstructured":"National Institute of Standards and Technology: Secure Hash Standard, FIPS PUB 180-1, Federal information processing standards publication, 1995, available on-line at http:\/\/www.itl.nist.gov\/fipspubs\/fips180-1.htm."},{"key":"10.1016\/S0950-5849(03)00049-1_BIB24","doi-asserted-by":"crossref","unstructured":"R. Rivest, The MD5 Message-Digest Algorithm, RFC 1321, MIT LCS & RSA Data Security Incorporation, April 1992.","DOI":"10.17487\/rfc1321"},{"year":"1996","series-title":"UNIX Internals, The New Frontiers","author":"Vahalia","key":"10.1016\/S0950-5849(03)00049-1_BIB25"},{"key":"10.1016\/S0950-5849(03)00049-1_BIB26","unstructured":"Object management group, Notification Service Specification, ftp:\/\/ftp.omg.org\/pub\/docs\/formal\/00-06-20.pdf, Framingham, MA: Object Management Group, 2000."},{"key":"10.1016\/S0950-5849(03)00049-1_BIB27","unstructured":"ORBacus Notify, http:\/\/www.iona.com\/products\/orbacus_home.htm."},{"key":"10.1016\/S0950-5849(03)00049-1_BIB28","unstructured":"Object management group (OMG), CORBA Interceptors Published Draft with CORBA 2.4+ Core, Chapters Document Number ptc\/01-03-04 available on http:\/\/www.omg.org."},{"key":"10.1016\/S0950-5849(03)00049-1_BIB29","unstructured":"Object management group (OMG), CORBA Security Service Specification Version 1.7 available on http:\/\/www.omg.org, March 2001."},{"year":"1999","series-title":"Enterprise Application Integration with CORBA","author":"Zahavi","key":"10.1016\/S0950-5849(03)00049-1_BIB30"},{"key":"10.1016\/S0950-5849(03)00049-1_BIB31","unstructured":"Driver Developer Site AnswerBook, Solaris 2.6 Writing Device Driver, SunSoft Incorporation, Mountain View, CA, 1997 http:\/\/docs.sun.com."},{"key":"10.1016\/S0950-5849(03)00049-1_BIB32","unstructured":"D. Cotroneo, A. Mazzeo, L. Romano, S. Russo, Using CORBA interceptors to implement a security wrapper, Proceedings of International Conference on Advances in Infrastructure for e-Business, e-Education, e-Science, and e-Medicine on the Internet 2002 (SSGRR 2002s), l'Aquila, Italy."}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584903000491?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584903000491?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T19:50:36Z","timestamp":1734033036000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950584903000491"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,6]]},"references-count":31,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2003,6]]}},"alternative-id":["S0950584903000491"],"URL":"https:\/\/doi.org\/10.1016\/s0950-5849(03)00049-1","relation":{},"ISSN":["0950-5849"],"issn-type":[{"type":"print","value":"0950-5849"}],"subject":[],"published":{"date-parts":[[2003,6]]}}}