{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T08:29:28Z","timestamp":1759825768891,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/dsn.2003.1209971","type":"proceedings-article","created":{"date-parts":[[2004,6,22]],"date-time":"2004-06-22T20:27:43Z","timestamp":1087936063000},"page":"615-624","source":"Crossref","is-referenced-by-count":29,"title":["Probabilistic validation of an intrusion-tolerant replication system"],"prefix":"10.1109","author":[{"given":"S.","family":"Singh","sequence":"first","affiliation":[]},{"given":"M.","family":"Cukier","sequence":"additional","affiliation":[]},{"given":"W.H.","family":"Sanders","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Probabilistic Validation of an Intrusion-tolerant Replication System","year":"2002","author":"singh","key":"13"},{"journal-title":"US Department of Defense Trusted Computer System Evaluation Criteria (\"Orange Book\")","year":"1985","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028904"},{"key":"12","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1007\/3-540-44667-2_9","article-title":"Stochastic Activity Networks: Formal Definitions and Concepts","author":"sanders","year":"2001","journal-title":"Lectures on Formal Methods and Performance Analysis"},{"key":"3","doi-asserted-by":"crossref","first-page":"956","DOI":"10.1109\/TSE.2002.1041052","article-title":"The Mo?bius Framework and Its Implementation","volume":"28","author":"deavours","year":"2002","journal-title":"IEEE Trans on Software Engineering"},{"key":"2","article-title":"Providing Intrusion Tolerance with ITUA","author":"courtney","year":"2002","journal-title":"Supplement of the 2002 Intl Conf on Dependable Sys and Networks (DSN-2002)"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/32.815323"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/356850.356852"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/32.588541"},{"key":"5","first-page":"307","article-title":"Survivability Analysis of Networked Systems","author":"jha","year":"2001","journal-title":"Proc 23rd Intl Conf on Software Engineering (ICSE2000)"},{"key":"4","first-page":"211","article-title":"Characterizing Intrusion Tolerant Systems Using A State Transition Model","author":"gong","year":"2001","journal-title":"Proc DARPA Information Survivability Conf and Exposition (DISCEX III)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932201"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-79789-7_30"}],"event":{"name":"2003 International Conference on Dependable Systems and Networks, 2003.","location":"San Francisco, CA, USA"},"container-title":["2003 International Conference on Dependable Systems and Networks, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8589\/27228\/01209971.pdf?arnumber=1209971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T08:15:45Z","timestamp":1497600945000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1209971\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/dsn.2003.1209971","relation":{},"subject":[]}}