{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:58:38Z","timestamp":1725533918048},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/hpcsim.2009.5194832","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T15:09:58Z","timestamp":1250003398000},"page":"184-192","source":"Crossref","is-referenced-by-count":1,"title":["A new approach to enforce the security properties of a clustered high-interaction honeypot"],"prefix":"10.1109","author":[{"given":"J.","family":"Briffaut","sequence":"first","affiliation":[]},{"given":"J.","family":"Rouzaud-Cornabas","sequence":"additional","affiliation":[]},{"given":"C.","family":"Toinard","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Zemali","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2004.1356776"},{"key":"22","first-page":"129","article-title":"detecting targeted attacks using shadow honeypots","author":"anagnostakis","year":"2005","journal-title":"14th USENIX Security Symposium"},{"key":"17","article-title":"white paper: integration of honeypot data into an alert correlation engine","author":"nguyen","year":"2005","journal-title":"Institut Eurecom France Tech Rep EURECOM+1707"},{"journal-title":"Formalization and guaranty of security properties Application to the detection of intrusions","year":"0","author":"briffaut","key":"23"},{"key":"18","article-title":"dynamic honeypot construction","author":"hecker","year":"2006","journal-title":"10th Colloquium for Information Systems Security Education"},{"key":"24","article-title":"a proposal for securing a large-scale high-interaction honeypot","author":"briffaut","year":"2008","journal-title":"Workshop on Security and High Performance Computing Systems"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2006.17"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.63"},{"key":"13","article-title":"monitoring both os and program level information flows to detect intrusions against network servers","author":"hiet","year":"2007","journal-title":"Proceedings of the 2nd workshop on MONitoring Attack detection and Mitigation"},{"journal-title":"Second Edition Learning about Security Threats","year":"2004","author":"project","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294293"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004370"},{"key":"21","article-title":"honeypots: how do you know when you are inside one?","author":"innes","year":"2005","journal-title":"4th Australian Digital Forensics Conference"},{"key":"3","article-title":"secure computer systems: mathematical foundations and model","author":"bell","year":"1973","journal-title":"The MITRE Corporation Bedford MA Technical Report M74-244"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495930"},{"key":"2","article-title":"increasing performance and granularity in rolebased access control systems : a case study in grsecurity","author":"spengle","year":"2004","journal-title":"Bucknell University Tech Rep"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/FITS.2003.1264934"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1357010.1352624"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2002.1021825"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"5","article-title":"challenges for information-flow security","author":"zdancewic","year":"2004","journal-title":"Proceedings of the 1st International Workshop on The Programming Language Interference and Dependence (PLID04"},{"key":"4","article-title":"integrity considerations for secure computer systems","author":"biba","year":"1975","journal-title":"The MITRE Corporation Technical Report MTR- 3153"},{"key":"9","first-page":"19","article-title":"making information flow explicit in histar","author":"zeldovich","year":"2006","journal-title":"OSDI '06 Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation"},{"key":"8","article-title":"preventing intrusions through non-interference","author":"giunti","year":"2006","journal-title":"Proceeding of the IEEE Mexican Conference on Informatics Security"}],"event":{"name":"Simulation (HPCS)","start":{"date-parts":[[2009,6,21]]},"location":"Leipzig, Germany","end":{"date-parts":[[2009,6,24]]}},"container-title":["2009 International Conference on High Performance Computing &amp; Simulation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5173446\/5191573\/05194832.pdf?arnumber=5194832","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T13:07:09Z","timestamp":1489756029000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5194832\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/hpcsim.2009.5194832","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}