{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:50:53Z","timestamp":1729615853593,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/isias.2015.7492754","type":"proceedings-article","created":{"date-parts":[[2016,6,16]],"date-time":"2016-06-16T20:14:55Z","timestamp":1466108095000},"page":"111-117","source":"Crossref","is-referenced-by-count":4,"title":["Security modeling and analysis of a self-cleansing intrusion tolerance technique"],"prefix":"10.1109","author":[{"given":"Iman El","family":"Mir","sequence":"first","affiliation":[]},{"given":"Dong Seong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Abdelkrim","family":"Haqiq","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/MSP.2006.95"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1016\/j.peva.2003.07.008"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/978-94-017-9618-7_34","article-title":"The design of a new virtualization-based server cluster system targeting for ubiquitous it systems","volume":"331","author":"lim","year":"2015","journal-title":"Ubiquitous Computing Application and Wireless Sensor (UCAWSN-14)"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/DSNW.2011.5958797"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/978-3-642-34883-9_15"},{"key":"ref15","first-page":"27","article-title":"Building a Resilient Service-Oriented Architecture Environment","author":"nguyen","year":"2013","journal-title":"Crosstalk J of Defense Software Eng"},{"key":"ref16","first-page":"104","article-title":"A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems","author":"alex","year":"2010","journal-title":"10 International Conference on Availability Reliability and Security (IEEEARES 2010)"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/DSNW.2012.6264680"},{"key":"ref18","first-page":"132","article-title":"Quantitative Approach to Tuning of a Time-Based Intrusion-Tolerant System Architecture","author":"nguyen","year":"2009","journal-title":"3rd Workshop Recent Advances on Intrusion-Tolerant Systems"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/COMPSAC.2005.145"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/MSP.2010.145"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/362686.362692"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.4304\/jnw.1.5.21-30"},{"key":"ref5","first-page":"45","article-title":"The design of a generic intrusion-tolerant architecture for web servers","author":"ayda","year":"2009","journal-title":"IEEE Trans Dependable and Secure Computing (TDSC)"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.5626\/JCSE.2013.7.4.242"},{"key":"ref7","article-title":"Self-cleansing systems for intrusion containment","author":"huang","year":"2002","journal-title":"Workshop on Self-Healing Adaptive and self-MANaged Systems (SHAMAN)"},{"key":"ref2","article-title":"Intrusion tolerant systems","author":"pal","year":"2000","journal-title":"Proceedings of the IEEE Information Survivability Workshop (ISW-2000)"},{"key":"ref1","first-page":"203","article-title":"A Fault and Intrusion-tolerant File System","author":"fraga","year":"1985","journal-title":"3rd International Conference on Computer Security (ICCS)"},{"key":"ref9","first-page":"38","article-title":"Sitar: a scalable intrusion-tolerant architecture for distributed services","author":"wang","year":"2001","journal-title":"Proc 2001 IEEE Workshop on Information Assurance and Security"}],"event":{"name":"2015 11th International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2015,12,14]]},"location":"Marrakech, Morocco","end":{"date-parts":[[2015,12,16]]}},"container-title":["2015 11th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7484378\/7492733\/07492754.pdf?arnumber=7492754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T17:15:05Z","timestamp":1568049305000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7492754\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/isias.2015.7492754","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}