{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:55:28Z","timestamp":1750308928690,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2003,10,31]],"date-time":"2003-10-31T00:00:00Z","timestamp":1067558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2003,10,31]]},"DOI":"10.1145\/1036921.1036934","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"110-114","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["An intrusion tolerant architecture for dynamic content internet servers"],"prefix":"10.1145","author":[{"given":"Ayda","family":"Saidane","sequence":"first","affiliation":[{"name":"LAAS-CNRS, France"}]},{"given":"Yves","family":"Deswarte","sequence":"additional","affiliation":[{"name":"LAAS-CNRS, France"}]},{"given":"Vincent","family":"Nicomette","sequence":"additional","affiliation":[{"name":"LAAS-CNRS, France"}]}],"member":"320","published-online":{"date-parts":[[2003,10,31]]},"reference":[{"volume-title":"Proc. 10th International Workshop on Security Protocols","year":"2002","author":"Valdes A.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","first-page":"3004","article-title":"Publications of the European Communities","volume":"92","year":"1991","journal-title":"ISBN"},{"volume-title":"Deliverable D21","year":"2003","author":"Adelsbach A.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","first-page":"110","volume-title":"Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA (USA)","author":"Deswarte Y.","year":"1991"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.863969"},{"key":"e_1_3_2_1_6_1","first-page":"2.1","volume-title":"IEEE Workshop on Intrusion Tolerant Systems, Sup. of the Proc. of the 2002 International Conference on Dependable Systems and Networks","author":"Luenam P.","year":"2002"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932178"},{"volume-title":"SITAR: A Scalable Intrusion Tolerance Architecture for Distributed Server IEEE 2nd SMC Information Assurance Workshop","year":"2001","author":"Wang F.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","first-page":"0337","article-title":"Diversity against Accidental and Deliberate Faults","volume":"0","author":"Deswarte Y.","year":"1999","journal-title":"P.Ammann, B.H.Barnes, S.Jajodia, E.H.Sibley, ISBN"},{"key":"e_1_3_2_1_10_1","first-page":"16","volume-title":"Sup. of the Proc. of the 2003 International Conference on Dependable Systems and Networks","author":"Uribe T.E.","year":"2003"},{"key":"e_1_3_2_1_11_1","unstructured":"SPI Labs SQL Injection: Are your Web Applications Vulnerable? http:\/\/www.spidynamics.com\/whitepapers\/WhitepaperSQLInjection.pdf  SPI Labs SQL Injection: Are your Web Applications Vulnerable? http:\/\/www.spidynamics.com\/whitepapers\/WhitepaperSQLInjection.pdf"},{"volume-title":"IICIS-2003","year":"2003","author":"Deswarte Y.","key":"e_1_3_2_1_12_1"},{"volume-title":"Elsevier Science","year":"2002","author":"Levy J.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1176994"},{"key":"e_1_3_2_1_15_1","unstructured":"CERT Advisory CA-2003-04 http:\/\/www.cert.org\/advisories\/CA-2003-04.html  CERT Advisory CA-2003-04 http:\/\/www.cert.org\/advisories\/CA-2003-04.html"},{"volume-title":"IEEE Workshop on Information Assurance","year":"2003","author":"Chinchani R.","key":"e_1_3_2_1_16_1"}],"event":{"name":"CCS03: Tenth ACM Conference on Computer and Communications Security 2003","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Fairfax VA","acronym":"CCS03"},"container-title":["Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1036921.1036934","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1036921.1036934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:36:48Z","timestamp":1750282608000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1036921.1036934"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,10,31]]},"references-count":16,"alternative-id":["10.1145\/1036921.1036934","10.1145\/1036921"],"URL":"https:\/\/doi.org\/10.1145\/1036921.1036934","relation":{},"subject":[],"published":{"date-parts":[[2003,10,31]]},"assertion":[{"value":"2003-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}