{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:51:58Z","timestamp":1742403118360,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/dsn.2004.1311915","type":"proceedings-article","created":{"date-parts":[[2004,11,12]],"date-time":"2004-11-12T19:14:14Z","timestamp":1100286854000},"page":"453-461","source":"Crossref","is-referenced-by-count":20,"title":["A qualitative analysis of the intrusion-tolerance capabilities of the MAFTIA architecture"],"prefix":"10.1109","author":[{"given":"R.","family":"Stroud","sequence":"first","affiliation":[]},{"given":"I.","family":"Welch","sequence":"additional","affiliation":[]},{"given":"J.","family":"Warne","sequence":"additional","affiliation":[]},{"given":"P.","family":"Ryan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Safety-Critical Computer Systems","year":"1996","author":"storey","key":"ref10"},{"journal-title":"Architectural Analysis of MAFTIA's Intrusion Tolerance Capabilities MAFTIA Project Deliverable D99","year":"2003","author":"welch","key":"ref11"},{"journal-title":"Design of the Local Reference Monitor MAFTIA Project Deliverable D6","year":"2002","author":"abghour","key":"ref12"},{"journal-title":"Specification of Dependable Trusted Third Parties MAFTIA Project Deliverable D26","year":"2001","author":"cachin","key":"ref13"},{"journal-title":"Security Engineering A Guide to Building Dependable Distributed Systems","year":"2001","author":"anderson","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45177-3_1","article-title":"Intrusion- Tolerant Architectures: Concepts and Design","volume":"2677","author":"verissimo","year":"2003","journal-title":"Architecting Dependable Systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1988.5327"},{"key":"ref17","first-page":"110","article-title":"Intrusion Tolerance in Distributed Systems","author":"deswarte","year":"1991","journal-title":"IEEE Symp Research in Security and Privacy"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"ref19","first-page":"173","article-title":"Practical Fault Tolerance","author":"castro","year":"1999","journal-title":"Usenix Association IEEE TCOS and ACM SIGOPS"},{"journal-title":"Design of an Intrusion-Tolerant Intrusion Detection System MAFTIA Project Deliverable D10","year":"2002","author":"dacier","key":"ref4"},{"key":"ref3","article-title":"Fundamental Concepts of Dependability, Research Report no. 01145 (Revision 1: December 2002), LAAS-CNRS, August 2001","author":"avizienis","year":"0","journal-title":"UCLA CSD Report no 010028 Newcastle University Report no CS-TR-739"},{"key":"ref6","article-title":"A Simple Intrusion-Tolerant Reliable Multicast Protocol using the TTCB","author":"cheuk lung","year":"2003","journal-title":"Simp&#x00F3;sio Brasileiro de Redes de Computadores (Natal Brasil)"},{"journal-title":"Complete Specification of APIs and Protocols for the MAFTIA Middleware MAFTIA Project Deliverable D9","year":"2002","author":"neves","key":"ref5"},{"key":"ref8","first-page":"c.1.1","article-title":"An Intrusion-Tolerant Authorization Scheme for Internet Applications","author":"deswarte","year":"0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/343477.343531"},{"journal-title":"Conceptual Model and Architecture of MAFTIA Project MAFTIA Deliverable","year":"2003","author":"powell","key":"ref2"},{"journal-title":"MAFTIA Reference Model and Use Cases Deliverable D1 MAFTIA Project","year":"2000","key":"ref9"},{"key":"ref1","first-page":"32d","article-title":"MAFTIA (Malicious- and Accidental-Fault Tolerance for Internet Applications)","author":"powell","year":"2001","journal-title":"Supplement of the 2001 Int Conf on Dependable Systems and Networks (DSN'2001) (G&#x00F6;teborg Sweden)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571638"},{"key":"ref22","first-page":"21","article-title":"Attack Trees","volume":"12","author":"schneier","year":"1999","journal-title":"Dr Dobb's Journal of Software Tools"},{"article-title":"Providing Intrusion Tolerance with ITUA","year":"0","author":"cukier","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"journal-title":"Attack Modeling for Information Security and Survivability CMU\/SEI-2001-TN-001 ADA388771","year":"2001","author":"moore","key":"ref23"},{"journal-title":"MAFTIA Project Web Site","year":"0","key":"ref25"}],"event":{"name":"International Conference on Dependable Systems and Networks, 2004","start":{"date-parts":[[2004,7,1]]},"location":"Florence, Italy","end":{"date-parts":[[2004,7,1]]}},"container-title":["International Conference on Dependable Systems and Networks, 2004"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9172\/29105\/01311915.pdf?arnumber=1311915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T07:52:04Z","timestamp":1497599524000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1311915\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/dsn.2004.1311915","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}