{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:05:38Z","timestamp":1730203538581,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ccgrid.2004.1336693","type":"proceedings-article","created":{"date-parts":[[2004,11,8]],"date-time":"2004-11-08T11:27:50Z","timestamp":1099913270000},"page":"656-663","source":"Crossref","is-referenced-by-count":2,"title":["Protection mechanisms for application service hosting platforms"],"prefix":"10.1109","author":[{"family":"Xuxian Jiang","sequence":"first","affiliation":[]},{"family":"Dongyan Xu","sequence":"additional","affiliation":[]},{"given":"R.","family":"Eigenmann","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","author":"owens","key":"19"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1145\/844102.844113"},{"key":"17","article-title":"LMbench: Portable tools for performance analysis","author":"mcvoy","year":"1996","journal-title":"USENIX Technical Conference"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1145\/1060289.1060308"},{"key":"18","article-title":"A distributed and compromise-tolerant mobile agent protection scheme","author":"onbilger","year":"2001","journal-title":"International Conference on Intelligent Agents Web Technology and Internet Commerce (IAWTIC 2001)"},{"key":"15","article-title":"User-level infrastructure for system call interposition: A platform for intrusion detection and confinement","author":"jain","year":"2000","journal-title":"Network and Distributed Systems Symposium (NDSS 2000)"},{"key":"16","article-title":"SODA: A service-on-demand architecture for application service hosting utility platforms","author":"jiang","year":"2003","journal-title":"IEEE HPDC-12"},{"year":"0","author":"dike","journal-title":"User Mode Linux","key":"13"},{"key":"14","article-title":"Re-virt: Enabling intrusion analysis through virtual-machine logging and replay","author":"dunlap","year":"2002","journal-title":"USENIX OSDI 2002"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1117\/12.417523"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/HASE.2001.966811"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1145\/1060289.1060312"},{"year":"0","journal-title":"Honeynet Project White Paper","article-title":"Know your enemy: Learning with user-mode linux","key":"3"},{"key":"20","article-title":"Towards virtual networks for virtual machine grid computing","author":"sundararaj","year":"2004","journal-title":"USENIX Symposium"},{"year":"0","key":"2"},{"year":"0","journal-title":"Ensim Virtual Private Server","key":"1"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/945461.945462"},{"year":"2001","journal-title":"HP Technical White Paper","key":"7"},{"year":"0","key":"6"},{"year":"0","key":"5"},{"year":"0","key":"4"},{"key":"9","article-title":"DOS-resistant authentication with client puzzles","volume":"2133","author":"aura","year":"2000","journal-title":"Security Protocols Workshop 2000 LNCS"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/INM.2001.918085"}],"event":{"name":"IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004.","location":"Chicago, IL, USA"},"container-title":["IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9282\/29475\/01336693.pdf?arnumber=1336693","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T01:11:09Z","timestamp":1489453869000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1336693\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ccgrid.2004.1336693","relation":{},"subject":[]}}