{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:55:28Z","timestamp":1750308928794,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2003,10,31]],"date-time":"2003-10-31T00:00:00Z","timestamp":1067558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2003,10,31]]},"DOI":"10.1145\/1036921.1036931","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"91-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Modeling insecurity"],"prefix":"10.1145","author":[{"given":"Prasad","family":"Naldurg","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, IL"}]},{"given":"Roy H.","family":"Campbell","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, IL"}]}],"member":"320","published-online":{"date-parts":[[2003,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/882493.884389"},{"key":"e_1_3_2_1_2_1","volume-title":"LAAS Report","author":"Avizienis A.","year":"2001","unstructured":"A. Avizienis , J. C. Laprie , and B. Randell . Fundamental concepts of dependability . In LAAS Report , April 2001 . A. Avizienis, J. C. Laprie, and B. Randell. Fundamental concepts of dependability. In LAAS Report, April 2001."},{"key":"e_1_3_2_1_3_1","volume-title":"Computer Security: Art and Science","author":"Bishop M.","year":"2002","unstructured":"M. Bishop . Computer Security: Art and Science . Addison-Wesley , ISBN 0-201-44099-7, 2002 . M. Bishop. Computer Security: Art and Science. Addison-Wesley, ISBN 0-201-44099-7, 2002."},{"key":"e_1_3_2_1_4_1","volume-title":"Model Checking","author":"Clarke E.","year":"2000","unstructured":"E. Clarke , O. Grumberg , and D. Peled . Model Checking . MIT Press 2000 . E. Clarke, O. Grumberg, and D. Peled. Model Checking. MIT Press 2000."},{"key":"e_1_3_2_1_5_1","volume-title":"Supplement of the 2002 International Conference on Dependable Systems and Networks","author":"Cukier M.","year":"2002","unstructured":"M. Cukier , T. Courtney , J. Lyons , H. V. Ramasamy , W. H. Sanders , M. Seri , M. Atighetchi , P. Rubel , C. Jones , F. Webber , P. Pal , R. Watro , and J. Gossett . Providing intrusion tolerance with itua . In Supplement of the 2002 International Conference on Dependable Systems and Networks , June 2002 . M. Cukier, T. Courtney, J. Lyons, H. V. Ramasamy, W. H. Sanders, M. Seri, M. Atighetchi, P. Rubel, C. Jones, F. Webber, P. Pal, R. Watro, and J. Gossett. Providing intrusion tolerance with itua. In Supplement of the 2002 International Conference on Dependable Systems and Networks, June 2002."},{"key":"e_1_3_2_1_6_1","volume-title":"IEEE Symp. on Research in Security and Privacy","author":"Deswarte Y.","year":"1991","unstructured":"Y. Deswarte , L. Blain , and J. C. Fabre . Intrusion tolerance in distributed systems . In IEEE Symp. on Research in Security and Privacy , Oakland, CA USA , April 1991 . Y. Deswarte, L. Blain, and J. C. Fabre. Intrusion tolerance in distributed systems. In IEEE Symp. on Research in Security and Privacy, Oakland, CA USA, April 1991."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/647882.760851"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"},{"key":"e_1_3_2_1_10_1","volume-title":"International Conference on Software Engineering (ICSE)","author":"Jha S.","year":"2001","unstructured":"S. Jha and J. Wing . Survivability analysis of networked systems . In International Conference on Software Engineering (ICSE) , May 2001 . S. Jha and J. Wing. Survivability analysis of networked systems. In International Conference on Software Engineering (ICSE), May 2001."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-6880-0","volume-title":"Trusted Recovery and Defensive Information Warfare","author":"Liu P.","year":"2002","unstructured":"P. Liu and S. Jajodia . Trusted Recovery and Defensive Information Warfare . Kluwer Academic Publishers , ISBN 0-7923-7572-6, 2002 . P. Liu and S. Jajodia. Trusted Recovery and Defensive Information Warfare. Kluwer Academic Publishers, ISBN 0-7923-7572-6, 2002."},{"key":"e_1_3_2_1_12_1","unstructured":"P. Naldurg and R. Campbell. Specification and verification of network denial of service. Work in Progress.  P. Naldurg and R. Campbell. Specification and verification of network denial of service. Work in Progress."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775442"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/306549.306559"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251421.1251428"}],"event":{"name":"CCS03: Tenth ACM Conference on Computer and Communications Security 2003","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Fairfax VA","acronym":"CCS03"},"container-title":["Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1036921.1036931","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1036921.1036931","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:36:48Z","timestamp":1750282608000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1036921.1036931"}},"subtitle":["policy engineering for survivability"],"short-title":[],"issued":{"date-parts":[[2003,10,31]]},"references-count":14,"alternative-id":["10.1145\/1036921.1036931","10.1145\/1036921"],"URL":"https:\/\/doi.org\/10.1145\/1036921.1036931","relation":{},"subject":[],"published":{"date-parts":[[2003,10,31]]},"assertion":[{"value":"2003-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}