{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:11:51Z","timestamp":1761930711064,"version":"build-2065373602"},"reference-count":42,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/dsn.2002.1028905","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T22:14:31Z","timestamp":1056579271000},"page":"239-248","source":"Crossref","is-referenced-by-count":10,"title":["Developing a heterogeneous intrusion tolerant CORBA system"],"prefix":"10.1109","author":[{"given":"D.","family":"Sames","sequence":"first","affiliation":[]},{"given":"B.","family":"Matt","sequence":"additional","affiliation":[]},{"given":"B.","family":"Niebuhr","sequence":"additional","affiliation":[]},{"given":"G.","family":"Tally","sequence":"additional","affiliation":[]},{"given":"B.","family":"Whitmore","sequence":"additional","affiliation":[]},{"given":"D.","family":"Bakken","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.1999.800037"},{"key":"35","doi-asserted-by":"crossref","DOI":"10.17487\/rfc1321","article-title":"The MD5 message-digest algorithm","author":"rivest","year":"1992"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"36","first-page":"68","article-title":"Secure agreement protocols: Reliable and atomic group multicast in Rampart","author":"reiter","year":"1994","journal-title":"Proc ACM Computer and Communications Security Conf"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.1994.302392"},{"key":"33","article-title":"A preliminary investigation of precision vs. fault tolerance trade-offs in voting algorithms","author":"parameswaran","year":"0","journal-title":"Digest of Fast Abstracts Presented at the International Conference on Dependable Systems and Networks (DSN-2001) Go?teborg Sweden July 2001"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1998.656294"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-9942(1997)3:1<31::AID-TAPO4>3.0.CO;2-A"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/35.565659"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2236"},{"year":"0","key":"14"},{"key":"37","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/3-540-60042-6_7","article-title":"The rampart toolkit for building high-integrity services","author":"reiter","year":"1995","journal-title":"Theory and Practice in Distributed Systems (Lecture Notes in Computer Science 938)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.1998.740506"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"year":"0","key":"12","article-title":"Data encryption standard"},{"key":"21","article-title":"The SecureGroup communication system","author":"moser","year":"2000","journal-title":"Proceedings of the IEEE Information Survivability Conference Hilton Head SC"},{"key":"20","article-title":"Eternel: Fault tolerance and live upgrades for distributed object systems","author":"moser","year":"0","journal-title":"DARPA Information Survivability Conference & Exposition Volume II 25 - 27 January 2000 Hilton Head South Carolina"},{"key":"42","article-title":"Intrusion tolerant systems","author":"pal","year":"0","journal-title":"Proceedings of the IEEE Information Survivability Workshop (ISW-2000) 24-26 October 2000 Boston Massachusetts"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502037"},{"key":"40","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45539-6_15","article-title":"Practical threshold signatures","author":"shoup","year":"2000","journal-title":"Advances in Cryptology ? EUROCRYPT 2000"},{"key":"22","article-title":"The eternal system","author":"moser","year":"0","journal-title":"Workshop on Compositional Software Architectures Monterey California January 6-8 1998"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.1997.597857"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1996.503686"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1996.503686"},{"key":"26","first-page":"507","article-title":"Providing support for survivable CORBA applications with the immune system","author":"narasimhan","year":"1999","journal-title":"Proceedings of the 19th IEEE International Conference on Distributed Computing Systems (Austin TX)"},{"key":"27","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/3-540-48910-X_23","article-title":"Distributed pseudo-random functions and KDCs","author":"naor","year":"1999","journal-title":"Advances in Cryptology-EUROCRYPT '99 (LNCS 1592)"},{"key":"28","article-title":"The design and performance of a pluggable protocols framework for real-time distributed object computing middleware","author":"o'ryan","year":"0","journal-title":"Proceedings of the IFIP\/ACM Middleware 2000 Conference Pallisades New York April 3-7 2000"},{"key":"29","first-page":"1","article-title":"General inter-ORB protocol","volume":"15","year":"1999","journal-title":"OMG Specification CORBA V2 3"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2001.941429"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2416-0_14"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1992.243618"},{"key":"1","article-title":"Middleware","author":"bakken","year":"2001","journal-title":"Encyclopedia of Distributed Computing"},{"journal-title":"The Common Object Request Broker Architecture and Specification Revision 2 5","year":"2001","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"6","article-title":"Proactive recovery in a byzantine-fault-tolerant system","author":"castro","year":"0","journal-title":"Proceedings of the 4th USENIX Symposium on Operating Systems Design and Implementation October 2000"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1992.243595"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/343477.343531"},{"journal-title":"The CORBA Security Service Draft Adopted Revision 1 8","year":"2001","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/4221.214134"},{"article-title":"A correctness proof for a practical byzantine-fault-tolerant replication algorithm","year":"1999","author":"castro","key":"9"},{"article-title":"Authenticated byzantine fault tolerance without public-key cryptography","year":"1999","author":"castro","key":"8"}],"event":{"name":"International Conference on Dependable Systems and Networks","acronym":"DSN-02","location":"Washington, DC, USA"},"container-title":["Proceedings International Conference on Dependable Systems and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7991\/22107\/01028905.pdf?arnumber=1028905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,24]],"date-time":"2020-03-24T00:03:38Z","timestamp":1585008218000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1028905\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/dsn.2002.1028905","relation":{},"subject":[]}}