{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:55Z","timestamp":1763468095278},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/dsnw.2012.6264686","type":"proceedings-article","created":{"date-parts":[[2012,8,17]],"date-time":"2012-08-17T15:49:12Z","timestamp":1345218552000},"page":"1-6","source":"Crossref","is-referenced-by-count":30,"title":["The TClouds architecture: Open and resilient cloud-of-clouds computing"],"prefix":"10.1109","author":[{"given":"Paulo","family":"Verissimo","sequence":"first","affiliation":[]},{"given":"Alysson","family":"Bessani","sequence":"additional","affiliation":[]},{"given":"Marcelo","family":"Pasin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45177-3_1","article-title":"Intrusion-tolerant architectures: Concepts and design","author":"verissimo","year":"2003","journal-title":"Architecting Dependable Systems Volume 2677 of LNCS"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.83"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.95"},{"key":"15","article-title":"Microsoft says lost sidekick data will be restored to users","author":"sarno","year":"2009","journal-title":"Los Angeles Times"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/78\/1\/012022"},{"key":"13","first-page":"18","article-title":"VM-FIT: Supporting intrusion tolerance with virtualisation technology","author":"reiser","year":"2007","journal-title":"Proceedings of the 1st Workshop on Recent Advances in Intrusion-Tolerant Systems"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2009.5429058"},{"key":"11","article-title":"DDoS attack rains down on amazon cloud","author":"metz","year":"2009","journal-title":"The Register"},{"journal-title":"Are We Safeguarding Social Data?","year":"2009","author":"naone","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966449"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2010.19"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.53"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807165"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958796"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2046582.2046588"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046753"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.158"},{"key":"9","first-page":"137","article-title":"MapReduce: Simplified data processing on large clusters","author":"dean","year":"2004","journal-title":"Proceedings of the second USENIX symposium on Operating systems design and implementation"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2011.15"}],"event":{"name":"2012 IEEE\/IFIP 42nd International Conference on Dependable Systems and Networks Workshops (DSN-W)","start":{"date-parts":[[2012,6,25]]},"location":"Boston, MA, USA","end":{"date-parts":[[2012,6,28]]}},"container-title":["IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6255871\/6264647\/06264686.pdf?arnumber=6264686","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T18:59:23Z","timestamp":1497985163000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6264686\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/dsnw.2012.6264686","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}