{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:55:28Z","timestamp":1750308928675,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2003,10,31]],"date-time":"2003-10-31T00:00:00Z","timestamp":1067558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2003,10,31]]},"DOI":"10.1145\/1036921.1036933","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"105-109","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["TRIAD"],"prefix":"10.1145","author":[{"given":"Andrew P.","family":"Moore","sequence":"first","affiliation":[{"name":"Camegie Mellon University"}]},{"given":"Robert J.","family":"Ellison","sequence":"additional","affiliation":[{"name":"Camegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2003,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Symp. on Object-oriented Real-time Distributed Computing","author":"Partha","year":"2003","unstructured":"Partha , P; Atighetchi, M.; Webber , F. ; Schantz , R. ; & Jones , C. \" Adaptive Use of Network-Centric Mechanisms in Cyber-Defense.\" 6th IEEE Int'l Symp. on Object-oriented Real-time Distributed Computing , Hakodate, Hokkaido, Japan. May 14-16, 2003 . Partha, P; Atighetchi, M.; Webber, F.; Schantz, R.; & Jones, C. \"Adaptive Use of Network-Centric Mechanisms in Cyber-Defense.\" 6th IEEE Int'l Symp. on Object-oriented Real-time Distributed Computing, Hakodate, Hokkaido, Japan. May 14-16, 2003."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","DOI":"10.21236\/ADA413701","volume-title":"Deriving Architectural Tactics: A Step Toward Methodical Architectural Design (CMU\/SEI-03-TR-004)","author":"Bachmann F.","year":"2003","unstructured":"Bachmann , F. ; Bass , L. ; & Klein , M. Deriving Architectural Tactics: A Step Toward Methodical Architectural Design (CMU\/SEI-03-TR-004) . Software Engineering Institute , 2003 . &lt;http:\/\/www.sei.cmu.edu\/publications\/documents&gt; Bachmann, F.; Bass, L.; & Klein, M. Deriving Architectural Tactics: A Step Toward Methodical Architectural Design (CMU\/SEI-03-TR-004). Software Engineering Institute, 2003. &lt;http:\/\/www.sei.cmu.edu\/publications\/documents&gt;"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.59"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","DOI":"10.21236\/ADA414865","volume-title":"Trustworthy Refinement through Intrusion-aware Design (TRIAD) (CMU\/SEI-03-TR-002)","author":"Ellison R.","year":"2003","unstructured":"Ellison R. & Moore , A. Trustworthy Refinement through Intrusion-aware Design (TRIAD) (CMU\/SEI-03-TR-002) , Software Engineering Institute , 2003 . &lt;http:\/\/www.sei.cmu.edu\/publications\/documents&gt; Ellison R. & Moore, A. Trustworthy Refinement through Intrusion-aware Design (TRIAD) (CMU\/SEI-03-TR-002), Software Engineering Institute, 2003. &lt;http:\/\/www.sei.cmu.edu\/publications\/documents&gt;"},{"key":"e_1_3_2_1_5_1","volume-title":"The Art of Systems Architecting","author":"Maier M. W.","year":"2000","unstructured":"Maier , M. W. & Rechtin , E. The Art of Systems Architecting . Boca Raton, FL : CRC Press , 2000 . Maier, M. W. & Rechtin, E. The Art of Systems Architecting. Boca Raton, FL: CRC Press, 2000."},{"key":"e_1_3_2_1_6_1","volume-title":"Business Dynamics: Systems Thinking and Modeling for a Complex World","author":"Sterman J. D.","year":"2000","unstructured":"Sterman , J. D. Business Dynamics: Systems Thinking and Modeling for a Complex World . Burr Ridge, IL : McGraw-Hill Higher Education , 2000 . Sterman, J. D. Business Dynamics: Systems Thinking and Modeling for a Complex World. Burr Ridge, IL: McGraw-Hill Higher Education, 2000."}],"event":{"name":"CCS03: Tenth ACM Conference on Computer and Communications Security 2003","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Fairfax VA","acronym":"CCS03"},"container-title":["Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1036921.1036933","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1036921.1036933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:36:48Z","timestamp":1750282608000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1036921.1036933"}},"subtitle":["a framework for survivability architecting"],"short-title":[],"issued":{"date-parts":[[2003,10,31]]},"references-count":6,"alternative-id":["10.1145\/1036921.1036933","10.1145\/1036921"],"URL":"https:\/\/doi.org\/10.1145\/1036921.1036933","relation":{},"subject":[],"published":{"date-parts":[[2003,10,31]]},"assertion":[{"value":"2003-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}