{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:52:17Z","timestamp":1750308737641,"version":"3.41.0"},"reference-count":12,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2013,11,11]],"date-time":"2013-11-11T00:00:00Z","timestamp":1384128000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2013,11,11]]},"abstract":"<jats:p>Computer systems invest substantial resources in securing their service. Costs of failure prevention are balanced against those of detection and recovery, even though recovery mechanisms can cause greater degradations of services. Most computer users consider degradations of service to be insidious and injurious. Yet, service degradations commonly assist in both the prevention and the curtailment of failures. Their toleration enables service continuation following fault activation, during which degradations are monitored for symptoms of security breaches.<\/jats:p>","DOI":"10.1145\/2532780.2532810","type":"journal-article","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T14:13:59Z","timestamp":1385561639000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Computer security with service degradations"],"prefix":"10.1145","volume":"38","author":[{"given":"Gertrude N.","family":"Levine","sequence":"first","affiliation":[{"name":"Fairleigh Dickinson University"}]}],"member":"320","published-online":{"date-parts":[[2013,11,11]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"2","article-title":"Fault tolerance with service degradations. Crosstalk","volume":"31","author":"Levine G.N.","year":"2011","unstructured":"Levine , G.N. 2011 . Fault tolerance with service degradations. Crosstalk : Journal of Defense Software Engineering , 31 , 2 (March, April 2011), pp. 22--24. Levine, G.N. 2011. Fault tolerance with service degradations. Crosstalk: Journal of Defense Software Engineering, 31, 2 (March, April 2011), pp. 22--24.","journal-title":"Journal of Defense Software Engineering"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1507195.1507205"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/881775.881781"},{"key":"e_1_2_1_4_1","volume-title":"Information technology","author":"IEC.","year":"2000","unstructured":"ISO\/ IEC. Information technology . 2000 . Code of practice for information security management. ISO\/IEC 17799: 2000(E), Geneva, Switzerland . ISO\/IEC. Information technology. 2000. Code of practice for information security management. ISO\/IEC 17799: 2000(E), Geneva, Switzerland."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.21"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"key":"e_1_2_1_7_1","first-page":"59","article-title":"Principles of crime reduction through product design","volume":"18","author":"Lester A.","year":"2002","unstructured":"Lester , A. 2002 . Principles of crime reduction through product design . Crime and Justice International , 18 , 59 (February 2002), pp. 9--11. Lester, A. 2002. Principles of crime reduction through product design. Crime and Justice International, 18, 59 (February 2002), pp. 9--11.","journal-title":"Crime and Justice International"},{"volume-title":"Modification of 1994 Computer Fraud and Abuse Act","author":"Fraud","key":"e_1_2_1_8_1","unstructured":"USC \u00a71030 Fraud and related activity in connection with computers. Modification of 1994 Computer Fraud and Abuse Act . Cornell University Law School . DOI= http:\/\/www.law.cornell.edu\/uscode\/text\/18\/1030 USC \u00a71030 Fraud and related activity in connection with computers. Modification of 1994 Computer Fraud and Abuse Act. Cornell University Law School. DOI= http:\/\/www.law.cornell.edu\/uscode\/text\/18\/1030"},{"key":"e_1_2_1_9_1","unstructured":"SANS Information Security Reading Room. DOI= http:\/\/www.sans.org\/reading_room\/whitepapers\/legal\/federal-computer-crime-laws_1446  SANS Information Security Reading Room. DOI= http:\/\/www.sans.org\/reading_room\/whitepapers\/legal\/federal-computer-crime-laws_1446"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_2_1_11_1","volume-title":"ed","author":"Kacprzyk J.","year":"2011","unstructured":"Kacprzyk , J. , Zamojski , W. , Mazurkiewicz , J. , Sugier , J. , and Walkowiak , T. , ed . 2011 . Dependable Computer Systems, Springer-Verlag (2011) , p. 261. Kacprzyk, J., Zamojski, W., Mazurkiewicz,J., Sugier, J., and Walkowiak, T., ed. 2011. Dependable Computer Systems, Springer-Verlag (2011), p. 261."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2011.10.004"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2532780.2532810","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2532780.2532810","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:06Z","timestamp":1750278126000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2532780.2532810"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,11]]},"references-count":12,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2013,11,11]]}},"alternative-id":["10.1145\/2532780.2532810"],"URL":"https:\/\/doi.org\/10.1145\/2532780.2532810","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2013,11,11]]},"assertion":[{"value":"2013-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}