{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:27:29Z","timestamp":1742383649838,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/prdc.2004.1276595","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"389-394","source":"Crossref","is-referenced-by-count":4,"title":["Ferret: a host vulnerability checking tool"],"prefix":"10.1109","author":[{"given":"A.","family":"Sharma","sequence":"first","affiliation":[]},{"given":"J.R.","family":"Martin","sequence":"additional","affiliation":[]},{"given":"N.","family":"Anand","sequence":"additional","affiliation":[]},{"given":"M.","family":"Cukier","sequence":"additional","affiliation":[]},{"given":"W.H.","family":"Sanders","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Building Secure Software","year":"2002","author":"viega","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2003.1209971"},{"journal-title":"Tiger Analytical Research Assistant Home Page","year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/32.815323"},{"key":"16","article-title":"Probabilistic validation of intrusion tolerance","author":"sanders","year":"2002","journal-title":"Supplemental Volume of the 2002 International Conference on Dependable Systems and Networks (DSN-2002)"},{"journal-title":"MAFTIA-Conceptual Model and Architecture","year":"2001","author":"powell","key":"13"},{"journal-title":"The Nessus Home Page","year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932201"},{"journal-title":"MAFTIA Reference Model and Use Cases","year":"2000","author":"cachin","key":"12"},{"journal-title":"Department of Defense Trusted Computer System Evaluation Criteria (Orange Book)","year":"1985","key":"3"},{"key":"2","article-title":"Quantitative assessment of operational security: Models and tools","author":"dacier","year":"1996","journal-title":"LAAS Research Report 96493"},{"key":"1","first-page":"317","article-title":"Privilege graph: An extension to the typed access matrix model","author":"dacier","year":"1994","journal-title":"Proc Third European Symposium Research in Computer Security (ESORICS94)"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/356850.356852"},{"journal-title":"Common Criteria for Information Technology Security Evaluation Part 1 Introduction and General Model Part 2 Security Functional Requirements and Part 3 Security Assurance Requirements Version 2 1","year":"1999","key":"7"},{"key":"6","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/978-3-540-45214-0_9","article-title":"Dependability and performance evaluation of intrusion-tolerant server architectures","volume":"2847","author":"gupta","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"key":"5","article-title":"Characterizing intrusion tolerant systems using a state transition model","author":"gong","year":"2001","journal-title":"Proc DARPA Information Survivability Conference and Exposition II DISCEX'01"},{"key":"4","first-page":"165","article-title":"The COPS security checker system","author":"farmer","year":"1990","journal-title":"Proc Summer USENIX Conference"},{"journal-title":"John the Ripper Password Cracker Home Page","year":"0","key":"9"},{"key":"8","first-page":"307","article-title":"Survivability analysis of networked systems","author":"jha","year":"2001","journal-title":"Proc of the 23rd International Conference on Software Engineering (ICSE 2001)"}],"event":{"name":"10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004.","location":"Papeete, Tahiti, French Polynesia"},"container-title":["10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8995\/28541\/01276595.pdf?arnumber=1276595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T03:56:23Z","timestamp":1497585383000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1276595\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/prdc.2004.1276595","relation":{},"subject":[]}}