{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:20Z","timestamp":1750307540788,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,7,6]],"date-time":"2009-07-06T00:00:00Z","timestamp":1246838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS 05-24695 (CT-CS: Trustworthy Cyber Infrastructure for the Power Grid (TCIP))"],"award-info":[{"award-number":["CNS 05-24695 (CT-CS: Trustworthy Cyber Infrastructure for the Power Grid (TCIP))"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 05-24695 (CT-CS: Trustworthy Cyber Infrastructure for the Power Grid (TCIP))"],"award-info":[{"award-number":["CNS 05-24695 (CT-CS: Trustworthy Cyber Infrastructure for the Power Grid (TCIP))"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,7,6]]},"DOI":"10.1145\/1619258.1619276","type":"proceedings-article","created":{"date-parts":[[2009,9,25]],"date-time":"2009-09-25T19:16:31Z","timestamp":1253906191000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Modular over-the-wire configurable security for long-lived critical infrastructure monitoring systems"],"prefix":"10.1145","author":[{"given":"Erik","family":"Solum","sequence":"first","affiliation":[{"name":"Washington State University, Pullman"}]},{"given":"Carl","family":"Hauser","sequence":"additional","affiliation":[{"name":"Washington State University, Pullman"}]},{"given":"Rasika","family":"Chakravarthy","sequence":"additional","affiliation":[{"name":"Washington State University, Pullman"}]},{"given":"Dave","family":"Bakken","sequence":"additional","affiliation":[{"name":"Washington State University, Pullman"}]}],"member":"320","published-online":{"date-parts":[[2009,7,6]]},"reference":[{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"e_1_3_2_1_3_1","unstructured":"\"Microsoft TechNet. Certificate Life Cycle URL: http:\/\/www.microsoft.com\/technet\/prodtcchnol\/windows2000serv\/reskit\/dist  \"Microsoft TechNet. Certificate Life Cycle URL: http:\/\/www.microsoft.com\/technet\/prodtcchnol\/windows2000serv\/reskit\/dist"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"F. Cleveland. IEC TC57 security standards for the power system's information-infrastructure beyond simple encryption. URL: http:\/\/xanthus-consulting.com\/Publications\/ June 2007.  F. Cleveland. IEC TC57 security standards for the power system's information-infrastructure beyond simple encryption. URL: http:\/\/xanthus-consulting.com\/Publications\/ June 2007.","DOI":"10.1109\/TDC.2006.1668652"},{"key":"e_1_3_2_1_5_1","first-page":"2246","article-title":"The TLS protocol","author":"Dierks T.","year":"1999","journal-title":"RFC"},{"volume-title":"Prentice Hall PTR","year":"2003","author":"Doraswamy N.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"National Institute of Standards and Technology (NIST). Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. NIST Special Publication (NIST SP) 800-67 May 2004.  National Institute of Standards and Technology (NIST). Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. NIST Special Publication (NIST SP) 800-67 May 2004."},{"key":"e_1_3_2_1_8_1","unstructured":"National Institute of Standards and Technology (NIST). Advanced Encryption Standard (AES). Federal Information Processing Standards Publication (FIPS PUB) 197 Nov 2001.  National Institute of Standards and Technology (NIST). Advanced Encryption Standard (AES). Federal Information Processing Standards Publication (FIPS PUB) 197 Nov 2001."},{"key":"e_1_3_2_1_9_1","unstructured":"National Institute of Standards and Technology (NIST). Data Encryption Standard (DES). Federal Information Processing Standards Publication (FIPS PUB) 46--3 October 1999.  National Institute of Standards and Technology (NIST). Data Encryption Standard (DES). Federal Information Processing Standards Publication (FIPS PUB) 46--3 October 1999."},{"key":"e_1_3_2_1_10_1","unstructured":"National Institute of Standards and Technology (NIST). Secure Hash Signature Standard (SHS). Federal Information Processing Standards Publication (FIPS PUB) 180-2 August 2002.  National Institute of Standards and Technology (NIST). Secure Hash Signature Standard (SHS). Federal Information Processing Standards Publication (FIPS PUB) 180-2 August 2002."},{"volume-title":"Washington State University","year":"2006","author":"Gjermundr\u00f8d K. H.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPAE.2005.1405870"},{"key":"e_1_3_2_1_13_1","unstructured":"Sun Microsystems. Java SE Security Sun Developer Network URL: http:\/\/java.sun.com\/javase\/technologies\/security Last checked 05.15.09.  Sun Microsystems. Java SE Security Sun Developer Network URL: http:\/\/java.sun.com\/javase\/technologies\/security Last checked 05.15.09."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1066862"},{"volume-title":"11th Annual Network and Distributed System Security Symposium","year":"2004","author":"Modadugu N.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251327.1251348"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266894.1266916"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359552"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"R. Rivest. RFC 1321: The MD5 message-digest algorithm April 1992. MIT Laboratory for Computer Science and RSA Data Security Inc.  R. Rivest. RFC 1321: The MD5 message-digest algorithm April 1992. MIT Laboratory for Computer Science and RSA Data Security Inc.","DOI":"10.17487\/rfc1321"},{"key":"e_1_3_2_1_20_1","first-page":"191","volume-title":"Cambridge Security Workshop Proceedings","author":"Schneier B.","year":"1993"},{"key":"e_1_3_2_1_21_1","first-page":"191","volume-title":"Winter 1988 Usenix Conference","author":"Steiner J. G.","year":"1988"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/820747.821330"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"J. Weiss. Java Cryptography Extensions: Practical Guide for Programmers. Morgan Kaufmann 1 edition 2004.   J. Weiss. Java Cryptography Extensions: Practical Guide for Programmers . Morgan Kaufmann 1 edition 2004.","DOI":"10.1016\/B978-012742751-5\/50009-8"},{"key":"e_1_3_2_1_24_1","unstructured":"ITU Telecommunication Standardization Sector (ITI-T). ITU-T RECOMMENDATION X.509 July 2005 URL: http:\/\/www.itu.int\/rec\/T-REC-X.509-200508-I\/en.  ITU Telecommunication Standardization Sector (ITI-T). ITU-T RECOMMENDATION X.509 July 2005 URL: http:\/\/www.itu.int\/rec\/T-REC-X.509-200508-I\/en."}],"event":{"name":"DEBS '09: The 3rd ACM International Conference on Distributed Event-based Systems","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Nashville Tennessee","acronym":"DEBS '09"},"container-title":["Proceedings of the Third ACM International Conference on Distributed Event-Based Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1619258.1619276","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1619258.1619276","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:23Z","timestamp":1750249403000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1619258.1619276"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,6]]},"references-count":23,"alternative-id":["10.1145\/1619258.1619276","10.1145\/1619258"],"URL":"https:\/\/doi.org\/10.1145\/1619258.1619276","relation":{},"subject":[],"published":{"date-parts":[[2009,7,6]]},"assertion":[{"value":"2009-07-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}