{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:41Z","timestamp":1740141821099,"version":"3.37.3"},"reference-count":20,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100002628","name":"Incheon National University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002628","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2014,1,1]]},"abstract":"<jats:p> Ubiquitous service environment based on DSN (distributed sensor networks) is poor in reliability of connection and has a high probability that the intrusion and the system failure may occur. In this paper, we propose an intrusion-tolerant Jini service architecture for integrating security and survivability support in order to provide end users with Jini services having a persistent state in ubiquitous environments. The proposed architecture is able to protect Jini service delivery not only from faults such as network partitioning or server crash but also from attacks exploiting flaws. It is designed to provide performance enough to show a low response latency so as to support seamless service usage. Through the experiment on a testbed, we have confirmed that the architecture is able to provide high security and availability at the level that the degradation of services quality is ignorable. <\/jats:p>","DOI":"10.1155\/2014\/695240","type":"journal-article","created":{"date-parts":[[2014,1,23]],"date-time":"2014-01-23T06:27:31Z","timestamp":1390458451000},"page":"695240","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Intrusion-Tolerant Jini Service Architecture for Integrating Security and Survivability Support in DSN"],"prefix":"10.1177","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9832-6839","authenticated-orcid":false,"given":"Sung-Ki","family":"Kim","sequence":"first","affiliation":[{"name":"Division of IT Education, Sun Moon University, 100 Kalsan-ri, Tangjeong-myeon, Asan-si 336-708, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6555-3464","authenticated-orcid":false,"given":"Byung-Gyu","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Sun Moon University, 100 Kalsan-ri, Tangjeong-myeon, Asan-si 336-708, Republic of Korea"}]},{"given":"Byoung-Joon","family":"Min","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Incheon National University, 119 Academy-ro, Yeonsu-gu, 406-772 Incheon, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2014,1,22]]},"reference":[{"key":"B3-2014-695240","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.2013.9.2.247"},{"key":"B4-2014-695240","doi-asserted-by":"publisher","DOI":"10.1002\/0470862084.ch18"},{"volume-title":"Jini Starter Kit 2.0 Tightens Jini's Security Framework","year":"2003","author":"Sommers F.","key":"B5-2014-695240"},{"volume-title":"Software Practice and Experience","year":"2007","author":"Meling H.","key":"B6-2014-695240"},{"first-page":"385","volume-title":"Proceedings of the 17th International Conference on Database and Expert Systems Applications","author":"Osrael J.","key":"B7-2014-695240"},{"volume-title":"Proceedings of the Blackhat Europe","author":"Sch\u00f6nefeld M.","key":"B8-2014-695240"},{"key":"B9-2014-695240","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75185-4_5"},{"first-page":"777","volume-title":"Proceedings of the 23rd IEEE International Performance, Computing, and Communications Conference (IPCCC '04)","author":"Meling H.","key":"B10-2014-695240"},{"first-page":"65","volume-title":"Proceedings of the ICSE Workshop on Software Architectures for Dependable Systems","author":"Tichy M.","key":"B11-2014-695240"},{"key":"B12-2014-695240","doi-asserted-by":"publisher","DOI":"10.1007\/10722515_16"},{"first-page":"161","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS '01)","author":"Eronen P.","key":"B13-2014-695240"},{"first-page":"276","volume-title":"Proceedings of the 4th International Conference on Electronic Commerce Research","author":"Schoch T.","key":"B14-2014-695240"},{"key":"B15-2014-695240","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028912"},{"key":"B16-2014-695240","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194957"},{"key":"B17-2014-695240","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24707-4_31"},{"key":"B18-2014-695240","doi-asserted-by":"publisher","DOI":"10.1080\/15501320701205068"},{"key":"B19-2014-695240","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.2013.9.2.205"},{"key":"B20-2014-695240","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2004.1278104"},{"key":"B22-2014-695240","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2004.1278104"},{"key":"B21-2014-695240","doi-asserted-by":"publisher","DOI":"10.1145\/322186.322188"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2014\/695240","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2014\/695240","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2014\/695240","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T19:03:47Z","timestamp":1621191827000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2014\/695240"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,1]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1,1]]}},"alternative-id":["10.1155\/2014\/695240"],"URL":"https:\/\/doi.org\/10.1155\/2014\/695240","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2014,1,1]]}}}