{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:50:25Z","timestamp":1750308625044,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,11,2]],"date-time":"2011-11-02T00:00:00Z","timestamp":1320192000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,11,2]]},"DOI":"10.1145\/2103380.2103434","type":"proceedings-article","created":{"date-parts":[[2012,1,17]],"date-time":"2012-01-17T17:20:41Z","timestamp":1326820841000},"page":"261-265","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The investigation of the structural properties of machines for the design of secure and trustworthy systems"],"prefix":"10.1145","author":[{"given":"Edward","family":"Jung","sequence":"first","affiliation":[{"name":"Southern Polytechnic State Univ., Marietta, GA"}]},{"given":"Chih-Cheng","family":"Hung","sequence":"additional","affiliation":[{"name":"Southern Polytechnic State Univ., Marietta, GA"}]},{"given":"Guangzhi","family":"Ma","sequence":"additional","affiliation":[{"name":"Huazhong Univ. of Science and Technology, Wuhan, China"}]},{"given":"Seonho","family":"Choi","sequence":"additional","affiliation":[{"name":"Bowie State University, Bowie, MD"}]}],"member":"320","published-online":{"date-parts":[[2011,11,2]]},"reference":[{"key":"#cr-split#-e_1_3_2_1_1_1.1","unstructured":"DHS Science and Technology \"A Roadmap for Cybersecurity Research.\" 2009. &lt;http:\/\/www.cyber.st.dhs.gov\/documents.html&gt"},{"key":"#cr-split#-e_1_3_2_1_1_1.2","unstructured":"DHS Science and Technology \"A Roadmap for Cybersecurity Research.\" 2009. &lt;http:\/\/www.cyber.st.dhs.gov\/documents.html&gt;"},{"volume-title":"Proceedings from National Cyber Leap Year Summit 2009 Co-Chair's Report. 8--24","key":"e_1_3_2_1_2_1"},{"volume-title":"Digital Systems Testing and Testable Design, 343--420.","year":"1990","author":"Abramovici M.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.2"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.203"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/43.16807"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.50"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEC.1962.5219325"},{"key":"e_1_3_2_1_9_1","unstructured":"J. Hartmanis and R. E. Sterns 1966. Algebraic Structure Theory of Sequential Machines. Prentice-Hall.   J. Hartmanis and R. E. Sterns 1966. Algebraic Structure Theory of Sequential Machines. Prentice-Hall."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103380.2103436"},{"key":"e_1_3_2_1_11_1","unstructured":"Z. Kohavi 1978 Switching and Finite Automata Theory. McGraw-Hill.   Z. Kohavi 1978 Switching and Finite Automata Theory. McGraw-Hill."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"P. K. Manadhata and J. M. Wing \"A Formal Model for A System's Attack Surface \" HP Laboratories HPL-2011-115.  P. K. Manadhata and J. M. Wing \"A Formal Model for A System's Attack Surface \" HP Laboratories HPL-2011-115.","DOI":"10.1007\/978-1-4614-0977-9_1"},{"volume-title":"World History: An Introduction","year":"1999","author":"Dorn J. E.","key":"e_1_3_2_1_13_1"},{"volume-title":"Proc. of the Computer Security Foundation Workshop III, IEEE","year":"1990","author":"Millen J.","key":"e_1_3_2_1_14_1"},{"volume-title":"Principled Assuredly Trustworthy Composable Architectures, 6--29","year":"2004","author":"Neumann P. G.","key":"e_1_3_2_1_15_1"},{"volume-title":"Symp. On Low-Power and High-Speed Chips (COOL Chips X)","year":"2007","author":"Shi Y.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","unstructured":"H. A. Simon The Architecture of Complexity: Hierarchic Systems 183--216. 1996. The Sciences of the Artificial 3rd edition MIT Press.  H. A. Simon The Architecture of Complexity: Hierarchic Systems 183--216. 1996. The Sciences of the Artificial 3 rd edition MIT Press."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1253571"}],"event":{"name":"RACS '11: Research in Applied Computation Symposium","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","ACCT Association of Convergent Computing Technology","CUSST University of Suwon: Center for U-city Security & Surveillance Technology of the University of Suwon","KIISE Korean Institute of Information Scientists and Engineers","KISTI"],"location":"Miami Florida","acronym":"RACS '11"},"container-title":["Proceedings of the 2011 ACM Symposium on Research in Applied Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2103380.2103434","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2103380.2103434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:07:47Z","timestamp":1750273667000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2103380.2103434"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11,2]]},"references-count":19,"alternative-id":["10.1145\/2103380.2103434","10.1145\/2103380"],"URL":"https:\/\/doi.org\/10.1145\/2103380.2103434","relation":{},"subject":[],"published":{"date-parts":[[2011,11,2]]},"assertion":[{"value":"2011-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}