{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:15:37Z","timestamp":1730258137959,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icsmc.2004.1401167","type":"proceedings-article","created":{"date-parts":[[2005,4,6]],"date-time":"2005-04-06T11:20:51Z","timestamp":1112786451000},"page":"4064-4071","source":"Crossref","is-referenced-by-count":0,"title":["Building a distributed security defence system"],"prefix":"10.1109","volume":"5","author":[{"given":"S.","family":"Daskapan","sequence":"first","affiliation":[]},{"given":"W.G.","family":"Vree","sequence":"additional","affiliation":[]},{"given":"H.G.","family":"Sol","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Immune system","year":"2000","author":"parham","key":"19"},{"journal-title":"36 Strategies of the Chinese Adapting Ancient Chinese Wisdom to the Business World","year":"2001","author":"wee","key":"22"},{"key":"17","first-page":"155","article-title":"KryptoKnight authentication and key distribution system","author":"molva","year":"1992","journal-title":"Proc of ESORICS"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/304851.304860"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1176985"},{"journal-title":"Formalizing Trust as a Computational Concept","year":"1994","author":"marsh","key":"16"},{"key":"13","first-page":"3","article-title":"Design issues of process migration facilities in distributed systems","volume":"4","author":"eskicioglu","year":"1989","journal-title":"IEEE Tech Committee Oper Syst Newsletter"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/32.41337"},{"key":"11","first-page":"36","article-title":"A new paradigm for trusted systems","author":"denning","year":"1992","journal-title":"Proceedings New Security Paradigms Workshop"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004373"},{"key":"21","first-page":"172","article-title":"The resurrecting duckling: Security issues for ad-hoc wireless networks","author":"stajano","year":"1999","journal-title":"Security Protocols Workshop"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039856"},{"journal-title":"Essential Immunology","year":"2001","author":"roitt","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/12.8727"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/2.35213"},{"journal-title":"The Selfish Gene","year":"1989","author":"dawkins","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30079-3_4"},{"key":"6","first-page":"45","article-title":"Why is Internet security a problem: A framework for pre-analyzing security lacks","author":"daskapan","year":"2001","journal-title":"Proc of the 6th EURAS Workshop"},{"key":"5","first-page":"49","article-title":"Trust as a commodity","author":"dasgupta","year":"1988","journal-title":"Trust Making and Breaking Cooperative Relations"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/4229.4234"},{"key":"9","first-page":"553","article-title":"The merge of computing paradigms","author":"daskapan","year":"2002","journal-title":"5th International Conf on Computer and Information Technology"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2003.1244371"}],"event":{"name":"2004 IEEE International Conference on Systems, Man and Cybernetics","acronym":"ICSMC-04","location":"The Hague, Netherlands"},"container-title":["2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9622\/30426\/01401167.pdf?arnumber=1401167","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T14:47:42Z","timestamp":1489502862000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1401167\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2004.1401167","relation":{},"subject":[]}}