{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:58:50Z","timestamp":1730224730405,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/hicss.2004.1265454","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T14:19:45Z","timestamp":1086877185000},"page":"10 pp.","source":"Crossref","is-referenced-by-count":1,"title":["Reflections on operating in hostile environments"],"prefix":"10.1109","author":[{"given":"A.","family":"Bazaz","sequence":"first","affiliation":[]},{"given":"J.D.","family":"Arthur","sequence":"additional","affiliation":[]},{"given":"R.","family":"Marchany","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"63","article-title":"StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks","author":"cowan","year":"1998","journal-title":"Proc 7th USENIX Security Conference"},{"article-title":"Writing Secure Code","year":"2002","author":"howard","key":"ref11"},{"article-title":"A Taxonomy of Computer Attacks with Applications to Wireless Networks","year":"2001","author":"lough","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/78973.78974"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/2.312041"},{"key":"ref15","article-title":"Hacker jailed for revenge sewage attacks","author":"simth","year":"2001","journal-title":"The Register"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/383775.383778"},{"journal-title":"Version 1 0 2","article-title":"Model Description","year":"1999","key":"ref17"},{"key":"ref18","article-title":"The Art of War","author":"tzu","year":"0","journal-title":"500 B C"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/358198.358210"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/504909.504911"},{"key":"ref3","article-title":"Use of Taxonomy of Security Faults","author":"aslam","year":"1996","journal-title":"19th National Information Systems Security Conference"},{"key":"ref6","article-title":"How to Write a Setuid Program","author":"bishop","year":"1986","journal-title":"Proc Cray User Group Conf"},{"key":"ref5","article-title":"Final Report Research ISI\/SR-78&#x2013;13","author":"bisbey","year":"1978","journal-title":"Information Science Institute University of Southern California"},{"journal-title":"Version 2","article-title":"Common Criteria for Information Technology Security Evaluation","year":"1999","key":"ref8"},{"key":"ref7","first-page":"131","article-title":"Checking for Race Conditions in File Accesses","volume":"9","author":"bishop","year":"1996","journal-title":"Computer Systems"},{"key":"ref2","first-page":"198","article-title":"Towards an Approach to Measuring Software Trust","author":"amoroso","year":"1981","journal-title":"IEEE Computer Society Symposium on Research in Security and Privacy"},{"key":"ref1","article-title":"Security Analysis and Enhancements of Computer Operating Systems","author":"abbot","year":"1976","journal-title":"Technical Report NBSIR 76&#x2013;1041 Lawrence Livermore Laboratory Institute for Computer Science and Technology"},{"journal-title":"The national academies press","article-title":"Trust in Cyberspace","year":"1999","key":"ref9"},{"key":"ref20","article-title":"Building Secure Software: How to avoid security problems the right way","author":"viega","year":"2001","journal-title":"Addison Wesley Professional"}],"event":{"name":"37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the","start":{"date-parts":[[2004,1,8]]},"location":"Big Island, HI, USA","end":{"date-parts":[[2004,1,8]]}},"container-title":["37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8934\/28293\/01265454.pdf?arnumber=1265454","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T23:39:18Z","timestamp":1489448358000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1265454\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/hicss.2004.1265454","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}