{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:56:49Z","timestamp":1742399809542},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,12]]},"DOI":"10.1109\/pccc.2008.4745136","type":"proceedings-article","created":{"date-parts":[[2009,1,16]],"date-time":"2009-01-16T11:04:49Z","timestamp":1232103889000},"page":"69-76","source":"Crossref","is-referenced-by-count":2,"title":["A Highly Available Transparent Linux Cluster Security Model"],"prefix":"10.1109","author":[{"given":"V.","family":"Ramsurrun","sequence":"first","affiliation":[]},{"given":"K. M. S.","family":"Soyjaudah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"543","article-title":"distributed denial of service: taxonomies of attacks, tools, and countermeasures","author":"specht","year":"0","journal-title":"2004 Proc 17th Int Conf Parallel and Distributed Computing Systems"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1109\/DSN.2006.17"},{"year":"2007","author":"ortega","journal-title":"GNU Mac Changer","key":"17"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1109\/DISCEX.2003.1194927"},{"year":"0","key":"18"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1109\/DISCEX.2003.1194975"},{"year":"2005","author":"hollenback","journal-title":"Improving Network reliability with Keepalived","key":"15"},{"key":"16","first-page":"55","author":"kopparapu","year":"2002","journal-title":"Load Balancing Servers Firewalls and Caches"},{"year":"0","key":"13"},{"year":"0","key":"14"},{"year":"2003","author":"hubert","journal-title":"Linux Advanced Routing & Traffic Control HOWTO","key":"11"},{"year":"2005","author":"davis","journal-title":"Linux Ethernet Bonding Driver HOWTO","key":"12"},{"year":"2000","author":"li","journal-title":"Distributed Firewall","key":"21"},{"year":"2005","journal-title":"Configuring Network Security with ACLs","key":"3"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.17487\/rfc2827"},{"key":"2","first-page":"256","article-title":"efficient cluster security gateway architecture for per-packet load balanced ip filtering on switched clusters","author":"ramsurrun","year":"0","journal-title":"2006 Proc CSNDSP'06 Conf"},{"year":"0","key":"1"},{"year":"2008","journal-title":"BIG-IP Local Traffic Manager","key":"10"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"year":"0","key":"5"},{"key":"4","first-page":"253","author":"odom","year":"2008","journal-title":"CCENT\/CCNA ICNDI Official Exam Certification Guide"},{"year":"2004","journal-title":"SERVERIRONXL? LAYER 4-7 APPLICATION SWITCHES","key":"9"},{"year":"0","key":"8"}],"event":{"name":"2008 IEEE International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2008,12,7]]},"location":"Austin, TX, USA","end":{"date-parts":[[2008,12,9]]}},"container-title":["2008 IEEE International Performance, Computing and Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4712735\/4745069\/04745136.pdf?arnumber=4745136","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T15:38:37Z","timestamp":1489765117000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4745136\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/pccc.2008.4745136","relation":{},"subject":[],"published":{"date-parts":[[2008,12]]}}}