{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:37:13Z","timestamp":1750307833448,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,6,23]],"date-time":"2008-06-23T00:00:00Z","timestamp":1214179200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,6,23]]},"DOI":"10.1145\/1383422.1383425","type":"proceedings-article","created":{"date-parts":[[2008,6,24]],"date-time":"2008-06-24T12:49:13Z","timestamp":1214311753000},"page":"11-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Securing stateful grid servers through virtual server rotation"],"prefix":"10.1145","author":[{"given":"Matthew","family":"Smith","sequence":"first","affiliation":[{"name":"University of Marburg, Marburg, Germany"}]},{"given":"Christian","family":"Schridde","sequence":"additional","affiliation":[{"name":"University of Marburg, Marburg, Germany"}]},{"given":"Bernd","family":"Freisleben","sequence":"additional","affiliation":[{"name":"University of Marburg, Marburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2008,6,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"May","author":"Team Globus Security","year":"2007","unstructured":"Globus Security Team , \" Globus Security Advisory 2007-03 : Nexus Vulnerability,\" http:\/\/www.globus.org\/mail archive\/securityannounce\/2007\/05\/msg00000.html , May 2007 . Globus Security Team, \"Globus Security Advisory 2007-03: Nexus Vulnerability,\" http:\/\/www.globus.org\/mail archive\/securityannounce\/2007\/05\/msg00000.html, May 2007."},{"key":"e_1_3_2_1_2_1","volume-title":"March","author":"Team Globus Security","year":"2007","unstructured":"Globus Security Team , \" Globus Security Advisory 2007-03 : GSI-OpenSSH Vulnerability,\" http:\/\/www-unix.globus.org\/mail archive\/securityannounce\/2007\/04\/msg00000.html , March 2007 . ---, \"Globus Security Advisory 2007-02: GSI-OpenSSH Vulnerability,\" http:\/\/www-unix.globus.org\/mail archive\/securityannounce\/2007\/04\/msg00000.html, March 2007."},{"key":"e_1_3_2_1_3_1","unstructured":"The Grid Security Vulnerability Group \"Critical Vulnerability: OpenPBS\/Torque \" http:\/\/security.fnal.gov\/CriticalVuln\/openpbs-10-23-2006.html.  The Grid Security Vulnerability Group \"Critical Vulnerability: OpenPBS\/Torque \" http:\/\/security.fnal.gov\/CriticalVuln\/openpbs-10-23-2006.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Internet Security Systems \"UNICORE Client Keystore Information Disclosure \" http:\/\/xforce.iss.net\/xforce\/xfdb\/30157 November 2006.  Internet Security Systems \"UNICORE Client Keystore Information Disclosure \" http:\/\/xforce.iss.net\/xforce\/xfdb\/30157 November 2006."},{"key":"e_1_3_2_1_5_1","volume-title":"A Crisis of Prioritization","author":"President's Information Technology Advisory Committee (PITAC), \"Cyber Security","year":"2005","unstructured":"President's Information Technology Advisory Committee (PITAC), \"Cyber Security : A Crisis of Prioritization ,\" 2005 , available at www.nitrd.gov. President's Information Technology Advisory Committee (PITAC), \"Cyber Security: A Crisis of Prioritization,\" 2005, available at www.nitrd.gov."},{"key":"e_1_3_2_1_6_1","first-page":"110","volume-title":"Intl. Symposium on Security and Privacy. IEEE","author":"Deswarte Y.","year":"1991","unstructured":"Y. Deswarte , L. Blain , and J.-C. Fabre , \" Intrusion Tolerance in Distributed Computing Systems ,\" in Intl. Symposium on Security and Privacy. IEEE , 1991 , pp. 110 -- 121 . Y. Deswarte, L. Blain, and J.-C. Fabre, \"Intrusion Tolerance in Distributed Computing Systems,\" in Intl. Symposium on Security and Privacy. IEEE, 1991, pp. 110--121."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.134"},{"key":"e_1_3_2_1_8_1","first-page":"12","article-title":"Closing Cluster Attack Windows through Server Redundancy and Rotations","author":"Huang Y.","year":"2006","unstructured":"Y. Huang , D. Arsenault , and A. Sood , \" Closing Cluster Attack Windows through Server Redundancy and Rotations ,\" in IEEE International Symposium on Cluster Computing and the Grid Workshops , 2006 , pp. 12 -- 18 . Y. Huang, D. Arsenault, and A. Sood, \"Closing Cluster Attack Windows through Server Redundancy and Rotations,\" in IEEE International Symposium on Cluster Computing and the Grid Workshops, 2006, pp. 12--18.","journal-title":"IEEE International Symposium on Cluster Computing and the Grid Workshops"},{"key":"e_1_3_2_1_9_1","unstructured":"Sandeep Junnarkar \"Anatomy of a Hacking \" 2002 available at http:\/\/news.com.com\/2009-1017-893228.html.  Sandeep Junnarkar \"Anatomy of a Hacking \" 2002 available at http:\/\/news.com.com\/2009-1017-893228.html."},{"key":"e_1_3_2_1_10_1","first-page":"18","article-title":"VM-FIT: Supporting Intrusion Tolerance with Virtualisation Technology","author":"Reiser H.","year":"2007","unstructured":"H. Reiser and R. Kapitza , \" VM-FIT: Supporting Intrusion Tolerance with Virtualisation Technology ,\" in Proceedings of the First Workshop on Recent Advances on Intrusion-Tolerant Systems , 2007 , pp. 18 -- 22 . H. Reiser and R. Kapitza, \"VM-FIT: Supporting Intrusion Tolerance with Virtualisation Technology,\" in Proceedings of the First Workshop on Recent Advances on Intrusion-Tolerant Systems, 2007, pp. 18--22.","journal-title":"Proceedings of the First Workshop on Recent Advances on Intrusion-Tolerant Systems"},{"key":"e_1_3_2_1_11_1","first-page":"135","volume-title":"IEEE","author":"Wang F.","year":"2001","unstructured":"F. Wang , F. Gong , C. Sargor , K. Goseva-Popstojanova , K. Trivedi , and F. Jou , \" SITAR: A Scalable Intrusion Tolerance Architecture for Distributed Servers,\" in In Second IEEE SMC Information Assurance Workshop . IEEE , 2001 , pp. 135 -- 144 . F. Wang, F. Gong, C. Sargor, K. Goseva-Popstojanova, K. Trivedi, and F. Jou, \"SITAR: A Scalable Intrusion Tolerance Architecture for Distributed Servers,\" in In Second IEEE SMC Information Assurance Workshop. IEEE, 2001, pp. 135--144."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1036921.1036924"},{"key":"e_1_3_2_1_13_1","first-page":"64","volume-title":"Conf. on Dependable Systems and Networks","author":"Cukier M.","year":"2001","unstructured":"M. Cukier , J. Lyons , P. Pandey , H. V. Ramasamy , W. H. Sanders , P. Pal , F. Webber , R. Schantz , J. Loyall , R. Watro , M. Atighetchi , and J. Gossett ., \" Intrusion Tolerance Approaches in ITUA,\" in In Fast Abstract Supplement of the 2001 Intl . Conf. on Dependable Systems and Networks , 2001 , pp. 64 -- 65 . M. Cukier, J. Lyons, P. Pandey, H. V. Ramasamy, W. H. Sanders, P. Pal, F. Webber, R. Schantz, J. Loyall, R.Watro, M. Atighetchi, and J. Gossett., \"Intrusion Tolerance Approaches in ITUA,\" in In Fast Abstract Supplement of the 2001 Intl. Conf. on Dependable Systems and Networks, 2001, pp. 64--65."},{"key":"e_1_3_2_1_14_1","first-page":"64","article-title":"The Design and Implementation of an Intrusion Tolerant System","author":"Reynolds J.","year":"2003","unstructured":"J. Reynolds , J. Just , E. Lawson , L. Clough , R. Maglich , and K. Levitt , \" The Design and Implementation of an Intrusion Tolerant System ,\" in Foundations of Intrusion Tolerant Systems. IEEE , 2003 , pp. 64 -- 65 . J. Reynolds, J. Just, E. Lawson, L. Clough, R. Maglich, and K. Levitt, \"The Design and Implementation of an Intrusion Tolerant System,\" in Foundations of Intrusion Tolerant Systems. IEEE, 2003, pp. 64--65.","journal-title":"Foundations of Intrusion Tolerant Systems. IEEE"},{"key":"e_1_3_2_1_15_1","first-page":"122","volume-title":"An Architecture for an Adaptive Intrusion Tolerant Server,\" in Security Protocols Workshop","author":"Valdes A.","year":"2002","unstructured":"A. Valdes , M. Almgren , S. Cheung , Y. Deswarte , B. Dutertre , J. Levy , H. Saidi , V. Stavridou , and T. E. Uribe , \" An Architecture for an Adaptive Intrusion Tolerant Server,\" in Security Protocols Workshop . Springer , 2002 , pp. 122 -- 145 . A. Valdes, M. Almgren, S. Cheung, Y. Deswarte, B. Dutertre, J. Levy, H. Saidi, V. Stavridou, and T. E. Uribe, \"An Architecture for an Adaptive Intrusion Tolerant Server,\" in Security Protocols Workshop. Springer, 2002, pp. 122--145."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1036921.1036934"},{"key":"e_1_3_2_1_17_1","first-page":"1","volume-title":"Towards Grid-based Intrusion Detection,\" in 10th IEEE\/IFIP Network Operations and Management Symposium (NOMS","author":"Schulter A.","year":"2006","unstructured":"A. Schulter , F. Navarro , F. Koch , and C. B. Westphall , \" Towards Grid-based Intrusion Detection,\" in 10th IEEE\/IFIP Network Operations and Management Symposium (NOMS 2006 ), 2006, pp. 1 -- 4 . A. Schulter, F. Navarro, F. Koch, and C. B. Westphall, \"Towards Grid-based Intrusion Detection,\" in 10th IEEE\/IFIP Network Operations and Management Symposium (NOMS 2006), 2006, pp. 1--4."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2005.221"},{"key":"e_1_3_2_1_19_1","first-page":"24","volume-title":"Security Issues in On-Demand Grid and Cluster Computing,\" in CCGRID '06: Proc. of the IEEE International Symposium on Cluster Computing and the Grid Workshops","author":"Smith M.","year":"2006","unstructured":"M. Smith , M. Engel , T. Friese , B. Freisleben , G. A. Koenig , and W. Yurcik , \" Security Issues in On-Demand Grid and Cluster Computing,\" in CCGRID '06: Proc. of the IEEE International Symposium on Cluster Computing and the Grid Workshops . Washington, DC, USA : IEEE Computer Society , 2006 , pp. 24 -- 32 . M. Smith, M. Engel, T. Friese, B. Freisleben, G. A. Koenig, and W. Yurcik, \"Security Issues in On-Demand Grid and Cluster Computing,\" in CCGRID '06: Proc. of the IEEE International Symposium on Cluster Computing and the Grid Workshops. Washington, DC, USA: IEEE Computer Society, 2006, pp. 24--32."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2006.04.009"},{"key":"e_1_3_2_1_21_1","volume-title":"Building a Demilitarized Zone with Data Encryption for Grid Environments,\" in Proceedings of First International Conference on Networks for Grid Applications","author":"Schmidt M.","year":"2007","unstructured":"M. Schmidt , M. Smith , N. Fallenbeck , H. Picht , and B. Freisleben , \" Building a Demilitarized Zone with Data Encryption for Grid Environments,\" in Proceedings of First International Conference on Networks for Grid Applications , 2007 . M. Schmidt, M. Smith, N. Fallenbeck, H. Picht, and B. Freisleben, \"Building a Demilitarized Zone with Data Encryption for Grid Environments,\" in Proceedings of First International Conference on Networks for Grid Applications, 2007."},{"key":"e_1_3_2_1_22_1","unstructured":"M. Schmidt N. Fallenbeck M. Smith and B. Freisleben \"Virtual Organization Based Firewalling in Virtualized Grid Environments \" 2008 (submitted for publication).  M. Schmidt N. Fallenbeck M. Smith and B. Freisleben \"Virtual Organization Based Firewalling in Virtualized Grid Environments \" 2008 (submitted for publication)."}],"event":{"name":"HPDC '08: International Symposium on High Performance Distributed Computing","sponsor":["ACM Association for Computing Machinery","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Boston MA USA","acronym":"HPDC '08"},"container-title":["Proceedings of the 17th international symposium on High performance distributed computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1383422.1383425","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1383422.1383425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:59Z","timestamp":1750255079000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1383422.1383425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6,23]]},"references-count":22,"alternative-id":["10.1145\/1383422.1383425","10.1145\/1383422"],"URL":"https:\/\/doi.org\/10.1145\/1383422.1383425","relation":{},"subject":[],"published":{"date-parts":[[2008,6,23]]},"assertion":[{"value":"2008-06-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}