{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T04:43:44Z","timestamp":1725597824959},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642227257"},{"type":"electronic","value":"9783642227264"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22726-4_41","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T16:11:49Z","timestamp":1311610309000},"page":"386-395","source":"Crossref","is-referenced-by-count":3,"title":["A Framework for Intrusion Tolerance in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Vishal M.","family":"Karande","sequence":"first","affiliation":[]},{"given":"Alwyn R.","family":"Pais","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"41_CR1","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A. Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Trans., Dependable and Secure Computing\u00a01(1), 11\u201333 (2004)","journal-title":"IEEE Trans., Dependable and Secure Computing"},{"key":"41_CR2","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Comm. of the ACM\u00a022, 612\u2013613 (1979)","journal-title":"Comm. of the ACM"},{"key":"41_CR3","first-page":"45","volume":"6","author":"A. Saidane","year":"2009","unstructured":"Saidane, A., Nicomette, V., Deswarte, Y.: The Design of a Generic Intrusion-Tolerant Architecture for Web Servers. IEEE Trans.\u00a06, 45\u201358 (2009)","journal-title":"IEEE Trans."},{"key":"41_CR4","unstructured":"Powell, D., Stroud, R.: Malicious-and Accidental-Fault Tolerance for Internet Applications: Conceptual Model and Architecture. Technical Report 03011, Project IST-1999-11583 MAFTIA, Deliverable D21, LAAS-CNRS (January 2003)"},{"key":"41_CR5","doi-asserted-by":"crossref","unstructured":"Ramasamy, H.V., Agbaria, A., Sanders, W.H.: CoBFIT: A Component-Based Framework for Intrusion Tolerance. In: 30th EUROMICRO Conference (EUROMICRO 2004), pp. 591\u2013600 (2004)","DOI":"10.1109\/EURMIC.2004.1333427"},{"key":"41_CR6","unstructured":"Information Technology Infrastructure Library, http:\/\/www.itil-officialsite.com\/home\/"},{"key":"41_CR7","unstructured":"Intrusion Tolerance via Threshold Cryptography, http:\/\/crypto.stanford.edu\/~dabo\/ITTC\/"},{"key":"41_CR8","doi-asserted-by":"crossref","unstructured":"Reynolds, J.C., Just, J., Clough, L., Maglich, R.: On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization. In: HICSS 2003, Track -9, vol. 9 (2003)","DOI":"10.1109\/HICSS.2003.1174911"},{"key":"41_CR9","unstructured":"Pal, P., Schantz, R., Atighetchi, M., Loyall, J.: What Next in Intrusion Tolerance. BBN Technologies, Cambridge"},{"key":"41_CR10","unstructured":"Popovic, K., Hocenski, Z.: Cloud computing security issues and challenges. In: IEEE Trans. MIPRO, 2010 Proceedings of the 33rd International Convention, pp. 344\u2013349 (May 2010)"},{"key":"41_CR11","unstructured":"Proposed Security Assessment and Authorization for U.S. Government Cloud Computing (November 2010), http:\/\/www.govinfosecurity.com\/"},{"key":"41_CR12","volume-title":"Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities","author":"R. Buyya","year":"2009","unstructured":"Buyya, R., Ranjan, R., Calheiros, R.N.: Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities. University of Melbourne, Australia (July 2009)"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22726-4_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T09:16:26Z","timestamp":1560417386000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22726-4_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227257","9783642227264"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22726-4_41","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}