{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T09:09:26Z","timestamp":1720602566879},"reference-count":90,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T00:00:00Z","timestamp":1456790400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"name":"SecFuNet","award":["FP7-ICT-STREP-288349"]},{"name":"CNPq\/Brazil","award":["590047\/2011-6","202104\/2012-5"]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Network and Computer Applications"],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1016\/j.jnca.2015.09.014","type":"journal-article","created":{"date-parts":[[2016,2,13]],"date-time":"2016-02-13T14:39:25Z","timestamp":1455374365000},"page":"173-189","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":12,"special_numbering":"C","title":["A cyber-resilient architecture for critical security services"],"prefix":"10.1016","volume":"63","author":[{"given":"Diego","family":"Kreutz","sequence":"first","affiliation":[]},{"given":"Oleksandr","family":"Malichevskyy","sequence":"additional","affiliation":[]},{"given":"Eduardo","family":"Feitosa","sequence":"additional","affiliation":[]},{"given":"Hugo","family":"Cunha","sequence":"additional","affiliation":[]},{"given":"Rodrigo","family":"da Rosa Righi","sequence":"additional","affiliation":[]},{"given":"Douglas D.J.","family":"de Macedo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jnca.2015.09.014_bib1","doi-asserted-by":"crossref","unstructured":"Alchieri E, Bessani A, Fraga J. A dependable infrastructure for cooperative web services coordination. In: ICWS; 2008. p. 21\u20138.","DOI":"10.1109\/ICWS.2008.54"},{"key":"10.1016\/j.jnca.2015.09.014_bib2","doi-asserted-by":"crossref","unstructured":"AlZain M, Pardede E, Soh B, Thom J. Cloud computing security: from single to multi-clouds. In: HICSS; January 2012. p. 5490\u20139.","DOI":"10.1109\/HICSS.2012.153"},{"key":"10.1016\/j.jnca.2015.09.014_bib3","unstructured":"Amazon Web Services, Inc., 2014. Amazon EC2 Pricing. \u3008goo.gl\/rJNrA6\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib4","doi-asserted-by":"crossref","unstructured":"Barreto L, Siqueira F, Fraga J, Feitosa E. An intrusion tolerant identity management infrastructure for cloud computing services. In ICWS; 2013. p. 155\u201362.","DOI":"10.1109\/ICWS.2013.30"},{"issue":"May (3)","key":"10.1016\/j.jnca.2015.09.014_bib5","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSP.2013.162","article-title":"Improving the security of cryptographic protocol standards","volume":"13","author":"Basin","year":"2015","journal-title":"IEEE Secur Priv"},{"issue":"May (3)","key":"10.1016\/j.jnca.2015.09.014_bib6","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MSP.2011.2","article-title":"Security modeling and analysis","volume":"9","author":"Bau","year":"2011","journal-title":"IEEE Secur Priv"},{"key":"10.1016\/j.jnca.2015.09.014_bib7","doi-asserted-by":"crossref","unstructured":"Bessani A. From byzantine fault tolerance to intrusion tolerance (a position paper). In: 2011 IEEE\/IFIP 41st international conference on dependable systems and networks workshops (DSN-W), June 2011. p. 15\u20138.","DOI":"10.1109\/DSNW.2011.5958857"},{"key":"10.1016\/j.jnca.2015.09.014_bib8","unstructured":"Bessani A, Alchieri E. A guided tour on the theory and practice of state machine replication. In: Tutorial at the 32nd Brazilian symposium on computer networks and distributed systems; 2014. URL \u3008http:\/\/www.di.fc.ul.pt\/~bessani\/publications\/tutorial-smr.pdf\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib9","doi-asserted-by":"crossref","unstructured":"Bessani A, Sousa J, Alchieri E. State machine replication for the masses with BFT-SMaRt. Technical report, DI\/FCUL; December 2013. URL \u3008http:\/\/hdl.handle.net\/10455\/6897\u3009.","DOI":"10.1109\/DSN.2014.43"},{"key":"10.1016\/j.jnca.2015.09.014_bib10","unstructured":"Bessani A, Mendes R, Oliveira T, Neves N, Correia M, Pasin M et al. Scfs: a shared cloud-backed file system. In: 2014 USENIX annual technical conference (USENIX ATC 14). Philadelphia, PA: USENIX Association; June 2014a. p. 169\u201380. URL \u3008https:\/\/www.usenix.org\/conference\/atc14\/technical-sessions\/presentation\/bessani\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib11","doi-asserted-by":"crossref","unstructured":"Bessani A, Sousa J, Alchieri E. State machine replication for the masses with BFT-SMART. In: 2014 44th Annual IEEE\/IFIP international conference on dependable systems and networks (DSN); June 2014b. p. 355\u201362.","DOI":"10.1109\/DSN.2014.43"},{"key":"10.1016\/j.jnca.2015.09.014_bib12","doi-asserted-by":"crossref","unstructured":"Botelho FA, Ramos FMV, Kreutz D, Bessani AN. On the feasibility of a consistent and fault-tolerant data store for sdns. In: Proceedings of the 2013 second European workshop on software defined networks. EWSDN \u05f313. IEEE Computer Society. Washington, DC, USA; 2013. p. 38\u201343. URL http:\/\/dx.doi.org\/10.1109\/EWSDN.2013.13.","DOI":"10.1109\/EWSDN.2013.13"},{"key":"10.1016\/j.jnca.2015.09.014_bib13","unstructured":"BOYD A. It security shifts from prevention to resiliency; September 2014. URL \u3008http:\/\/goo.gl\/01poFz\u3009."},{"issue":"1","key":"10.1016\/j.jnca.2015.09.014_bib14","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s13173-012-0062-x","article-title":"On the reliability and availability of replicated and rejuvenating systems under stealth attacks and intrusions","volume":"18","author":"Brand\u00e3o","year":"2012","journal-title":"J Braz Comput Soc"},{"key":"10.1016\/j.jnca.2015.09.014_bib15","unstructured":"Business, Annual global EY survey finds organizations are still unprepared for inevitable cyber attacks; November 2014. URL \u3008http:\/\/goo.gl\/bymJQZ\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib16","unstructured":"Castle B. The bouncy castle crypto apis for java; 2010. URL \u3008https:\/\/www.bouncycastle.org\u3009."},{"issue":"4","key":"10.1016\/j.jnca.2015.09.014_bib17","doi-asserted-by":"crossref","first-page":"1097","DOI":"10.1016\/j.jnca.2010.06.004","article-title":"Cloud security defence to protect cloud computing against http-dos and xml-dos attacks","volume":"34","author":"Chonka","year":"2011","journal-title":"J Netw Comput Appl"},{"key":"10.1016\/j.jnca.2015.09.014_bib18","unstructured":"Clamshell, 2013. Clamshell: an OpenID server. \u3008goo.gl\/09pYF\u3009 [retrieved: March, 2014]."},{"key":"10.1016\/j.jnca.2015.09.014_bib19","first-page":"15","article-title":"Fitch","volume":"vol. 7891","author":"Cogo","year":"2013"},{"key":"10.1016\/j.jnca.2015.09.014_bib20","first-page":"95","article-title":"Clouds-of-clouds for dependability and security","volume":"vol. 8374","author":"Correia","year":"2014"},{"key":"10.1016\/j.jnca.2015.09.014_bib21","doi-asserted-by":"crossref","unstructured":"Correia M, Verissimo P, Neves NF. The design of a cotsreal-time distributed security kernel. In: Proceedings of the 4th European dependable computing conference on dependable computing. EDCC-4. London, UK: Springer-Verlag; 2002. p. 234\u201352. URL \u3008http:\/\/dl.acm.org\/citation.cfm?id=645333.649842\u3009.","DOI":"10.1007\/3-540-36080-8_21"},{"key":"10.1016\/j.jnca.2015.09.014_bib22","doi-asserted-by":"crossref","unstructured":"Simon D, Aboba B, Hurst R, Corporation, M. RFC 5216: the EAP-TLS authentication protocol. Request for Comments at IETF; 2008. URL \u3008http:\/\/www.ietf.org\/rfc\/rfc5216.txt\u3009.","DOI":"10.17487\/rfc5216"},{"key":"10.1016\/j.jnca.2015.09.014_bib23","doi-asserted-by":"crossref","unstructured":"DeKok A, Lior A. Remote authentication dial in user service (RADIUS) protocol extensions. RFC 6929 (Proposed Standard); April 2013. URL \u3008http:\/\/www.ietf.org\/rfc\/rfc6929.txt \u3009.","DOI":"10.17487\/rfc6929"},{"key":"10.1016\/j.jnca.2015.09.014_bib24","unstructured":"Delgado R. 9 cyber security threats faced by big businesses; November 2014. URL \u3008http:\/\/goo.gl\/5CkrSK\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib25","doi-asserted-by":"crossref","unstructured":"Do TV, Jonvik T, Jorstad I, Do TV. Better user protection with mobile identity. In: 2013 international conference on IT convergence and security (ICITCS); December 2013. p. 1\u20134.","DOI":"10.1109\/ICITCS.2013.6717809"},{"issue":"May (5)","key":"10.1016\/j.jnca.2015.09.014_bib26","article-title":"Why cloud computing will never be free","volume":"53","author":"Durkee","year":"2010","journal-title":"ACM Commun"},{"key":"10.1016\/j.jnca.2015.09.014_bib27","unstructured":"EU News & policy debates, across languages. One million cyber attacks a day on deutsche telekom network; November 2014. URL \u3008http:\/\/www.euractiv.com\/sections\/infosociety\/one-million-cyber-attacks-day-deutsche-telekom-network-309758\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib28","unstructured":"European Commission. Biggest ever cyber security exercise in Europe today; October 2014. URL \u3008http:\/\/europa.eu\/rapid\/press-release_IP-14-1227_en.htm\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib29","unstructured":"FreeRADIUS. Documentation, 2012. \u3008goo.gl\/6g8Qy\u3009 [retrieved: March, 2014]."},{"key":"10.1016\/j.jnca.2015.09.014_bib30","doi-asserted-by":"crossref","unstructured":"Garcia M, Bessani A, Gashi I, Neves N, Obelheiro R. OS diversity for intrusion tolerance: Myth or reality? In: IEEE\/IFIP 41st international conference on dependable systems networks (DSN); June 2011. p. 383\u201394.","DOI":"10.1109\/DSN.2011.5958251"},{"issue":"6","key":"10.1016\/j.jnca.2015.09.014_bib31","first-page":"735","article-title":"Analysis of operating system diversity for intrusion tolerance","volume":"44","author":"Garcia","year":"2014","journal-title":"Softw: Pract Exp"},{"key":"10.1016\/j.jnca.2015.09.014_bib32","unstructured":"Gaudin S. Researcher builds system to protect against malicious insiders; October 2014. URL \u3008http:\/\/www.computerworld.com\/article\/2825952\/researcher-builds-system-to-protect-against-malicious-insiders.html\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib33","unstructured":"GEANT & TERENA. eduroam; 2012. \u3008https:\/\/www.eduroam.org\/\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib34","unstructured":"Gittlen S. Revamping your insider threat program; July 2014. URL \u3008http:\/\/www.computerworld.com\/article\/2491370\/security0\/revamping-your-insider-threat-program.html\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib35","unstructured":"Gluu. High availability clusters, 2014. \u3008goo.gl\/oBZOEN \u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib36","unstructured":"Goche M, Gouveia W. Why cyber security is not enough: You need cyber resilience; January 2014. URL \u3008http:\/\/www.forbes.com\/sites\/sungardas\/2014\/01\/15\/why-cyber-security-is-not-enough-you-need-cyber-resilience\/\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib37","series-title":"The datacenter as a computer: an introduction to the design of warehouse-scale machines","author":"Hoelzle","year":"2009"},{"key":"10.1016\/j.jnca.2015.09.014_bib38","doi-asserted-by":"crossref","unstructured":"Hume A, Al-Hazmi Y, Belter B, Campowsky K, Carril L, Carrozzo G, et al. Bonfire: a multi-cloud test facility for internet of services experimentation. In: Testbeds and research infrastructure. Development of networks and communities. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering. vol. 44. Berlin: Springer; 2012. p. 81\u201396.","DOI":"10.1007\/978-3-642-35576-9_11"},{"key":"10.1016\/j.jnca.2015.09.014_bib39","unstructured":"IBM Security Systems. IBM X-force 2012 trend and risk report. Technical report, IBM; March 2013. URL \u3008http:\/\/www.ibm.com\/ibm\/files\/I218646H25649F77\/Risk_Report.pdf\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib40","unstructured":"Johnson C, Badger L, Waltermire D. Guide to cyber threat information sharing (draft). Technical report, National Institute of Standards and Technology (NIST), NIST Special Publication 800-150 (Draft); October 2014. URL \u3008http:\/\/csrc.nist.gov\/publications\/drafts\/800-150\/sp800_150_draft.pdf\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib41","unstructured":"Juniper Networks. Steel belted RADIUS carrier 7.0 administration and configuration guide; 2010. \u3008goo.gl\/Y5b9k\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib42","unstructured":"Kisin BB. Openid with certificate-based user authentication on smartcard [Ph.D. thesis]. Bilkent\/Ankara, Turkey: Graduate School of Engineering and Science of Bilkent University; May 2013. URL \u3008http:\/\/www.thesis.bilkent.edu.tr\/0006567.pdf\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib43","doi-asserted-by":"crossref","unstructured":"Kreutz D, Bessani A, Feitosa E, Cunha H. Towards secure and dependable authentication and authorization infrastructures. In: 2014 IEEE 20th Pacific rim international symposium on dependable computing (PRDC), November 2014a. p. 43\u201352.","DOI":"10.1109\/PRDC.2014.14"},{"key":"10.1016\/j.jnca.2015.09.014_bib44","doi-asserted-by":"crossref","unstructured":"Kreutz D, Casimiro A, Pasin M. A trustworthy and resilient event broker for monitoring cloud infrastructures. In: Proceedings of the 12th IFIP WG 6.1 DAIS. Stockholm: Springer-Verlag; 2012. p. 87\u201395.","DOI":"10.1007\/978-3-642-30823-9_7"},{"key":"10.1016\/j.jnca.2015.09.014_bib45","doi-asserted-by":"crossref","unstructured":"Kreutz D, Feitosa E. Identity providers-as-a-service built as cloud-of-clouds: challenges and opportunities. In: Ganzha M, Maciaszek L, MP, editors. Position papers of the 2014 federated conference on computer science and information systems. Annals of computer science and information systems, vol. 3. Warsaw: PTI; 2014. p. 101\u20138. URL http:\/\/dx.doi.org\/10.15439\/2014F465.","DOI":"10.15439\/2014F465"},{"key":"10.1016\/j.jnca.2015.09.014_bib46","doi-asserted-by":"crossref","unstructured":"Kreutz D, Feitosa E, Cunha H, Niedermayer H, Kinkelin H. Increasing the resilience and trustworthiness of OpenID identity providers for future networks and services. In: 2014 ninth international conference on availability, reliability and security (ARES); September 2014b. p. 317\u201324.","DOI":"10.1109\/ARES.2014.49"},{"key":"10.1016\/j.jnca.2015.09.014_bib47","unstructured":"Kreutz D, Malichevskyy O, Feitosa E, Barbosa KRS, Cunha H. System design artifacts for resilient identification and authentication infrastructures. In: The tenth international conference on networking and services (ICNS). IARIA; April 2014c. p. 41\u20137."},{"key":"10.1016\/j.jnca.2015.09.014_bib48","unstructured":"Kreutz D, Niedermayer H, Feitosa E, da Silva Fraga J, Malichevskyy O. Architecture components for resilient networks. Technical report. SecFuNet Consortium; 2013a, \u3008http:\/\/goo.gl\/xBHCNb\u3009[retrieved: March, 2014]."},{"issue":"January (1)","key":"10.1016\/j.jnca.2015.09.014_bib49","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","article-title":"Software-defined networking","volume":"103","author":"Kreutz","year":"2015","journal-title":"Proc IEEE"},{"key":"10.1016\/j.jnca.2015.09.014_bib50","doi-asserted-by":"crossref","unstructured":"Kreutz D, Ramos FM, Verissimo P. Towards secure and dependable software-defined networks. In: SIGCOMM HotSDN. HotSDN \u05f313. New York, NY, USA: ACM; 2013b. p. 55\u201360. URL http:\/\/doi.acm.org\/10.1145\/2491185.2491199.","DOI":"10.1145\/2491185.2491199"},{"key":"10.1016\/j.jnca.2015.09.014_bib51","doi-asserted-by":"crossref","unstructured":"Kreutz D, Ramos FMV, Verissimo P, Esteve Rothenberg C, Azodolmolky S, Uhlig S. Software-defined networking: a comprehensive survey. ArXiv e-prints; June 2014.","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"10.1016\/j.jnca.2015.09.014_bib52","doi-asserted-by":"crossref","unstructured":"Lau J, Barreto L, Fraga J. An infrastructure based in virtualization for intrusion tolerant services. In: 2012 IEEE 19th international conference on Web services (ICWS); June 2012. p. 170\u20137.","DOI":"10.1109\/ICWS.2012.82"},{"key":"10.1016\/j.jnca.2015.09.014_bib53","unstructured":"Lee W, Rotoloni B. Emerging cyber threats report 2015. Technical report. Georgia Tech Institute of Technology, by GTISC and GTRI at Georgia Tech Cyber Security Summit; October 2014. URL \u3008http:\/\/gtsecuritysummit.com\/2015Report.pdf\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib54","doi-asserted-by":"crossref","unstructured":"Leicher A, Schmidt A, Shah Y, Cha I. Trusted computing enhanced OpenID. In: ICITST; 2010. p. 1\u20138.","DOI":"10.4018\/jdtis.2010040101"},{"issue":"Fourth (4)","key":"10.1016\/j.jnca.2015.09.014_bib55","doi-asserted-by":"crossref","first-page":"1979","DOI":"10.1109\/SURV.2013.032713.00098","article-title":"A survey of payment approaches for identity federations in focus of the saml technology","volume":"15","author":"Lutz","year":"2013","journal-title":"IEEE Commun Surv Tutor"},{"key":"10.1016\/j.jnca.2015.09.014_bib56","doi-asserted-by":"crossref","unstructured":"Mansfield-Devine S. Danger in the clouds. Netw Secur 2008;(12):9\u201311. URL \u3008http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1353485808701405\u3009.","DOI":"10.1016\/S1353-4858(08)70140-5"},{"key":"10.1016\/j.jnca.2015.09.014_bib57","unstructured":"McAfee Labs. 2013 threats predictions. Technical report. McAfee; March 2013. URL \u3008http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-threat-predictions-2013.pdf\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib58","unstructured":"Morgan C. Cloud security concerns relating to the difference in infrastructure and data operational control. Technical report. itSMF International; May 2011. URL \u3008http:\/\/www.itsmfi.org\/files\/Cloud%20Security%20Concerns%20-%20Morgan.pdf\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib59","unstructured":"Moteff JD. Critical infrastructure resilience: the evolution of policy and programs and issues for congress. Technical Report R42683, Congressional Research Service, cRS Report for Congress; August 2014. \u3008www.crs.gov\u3009. URL \u3008fas.org\/sgp\/crs\/homesec\/R42683.pdf\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib60","unstructured":"MySQL & Network RADIUS. Deploying FreeRADIUS with the MySQL cluster database; 2009. \u3008goo.gl\/GXuZHH\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib61","unstructured":"Niedermayer H, Kreutz D, Feitosa E, Malichevskyy O, Bessani A, Fraga J. Trustworthy and resilient authentication service architectures. Technical report. SecFuNet.eu; 2014."},{"key":"10.1016\/j.jnca.2015.09.014_bib62","doi-asserted-by":"crossref","unstructured":"Nogueira R, Araujo F, Barbosa R. CloudBFT: elastic byzantine fault tolerance. In: 2014 IEEE 20th pacific rim international symposium on dependable computing (PRDC); November 2014. p. 180\u20139.","DOI":"10.1109\/PRDC.2014.31"},{"key":"10.1016\/j.jnca.2015.09.014_bib63","unstructured":"OpenID. OpenID community wiki; 2010. \u3008goo.gl\/PCASy\u3009 [retrieved: March, 2014]."},{"key":"10.1016\/j.jnca.2015.09.014_bib64","unstructured":"OpenID4Java. OpenID 2.0 Java libraries; 2013. \u3008goo.gl\/c3kFV\u3009 [retrieved: March, 2014]."},{"key":"10.1016\/j.jnca.2015.09.014_bib65","unstructured":"O\u05f3Rourke TD. Critical infrastructure, interdependencies, and resilience; 2009. URL \u3008http:\/\/goo.gl\/QqbfRu\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib66","doi-asserted-by":"crossref","unstructured":"Prince M. The DDoS that almost broke the internet; 2013. \u3008goo.gl\/g5Qs1\u3009 [retrieved: March, 2014].","DOI":"10.1016\/S1353-4858(13)70045-X"},{"key":"10.1016\/j.jnca.2015.09.014_bib67","unstructured":"Prince, M. Ceasefires don\u05f3t end cyberwars; 2012. \u3008goo.gl\/GI506\u3009 [retrieved: March, 2014]."},{"key":"10.1016\/j.jnca.2015.09.014_bib68","unstructured":"RADIUS Partnerships. Deploying RADIUS: practices and principles for AAA solutions; 2008. \u3008goo.gl\/fslu7\u3009 [retrieved: March, 2014]."},{"key":"10.1016\/j.jnca.2015.09.014_bib69","doi-asserted-by":"crossref","unstructured":"Recordon D, Reed D. OpenID 2.0: a platform for user-centric identity management. In: 2nd workshop on digital IDM; 2006. p. 11\u20136.","DOI":"10.1145\/1179529.1179532"},{"key":"10.1016\/j.jnca.2015.09.014_bib70","unstructured":"Reuters. Microsoft cloud service suffers outage, MSN web portal unavailable; November 2014. URL \u3008http:\/\/ibnlive.in.com\/news\/microsoft-cloud-service-suffers-outage-msn-web-portal-unavailable\/513653-11.html\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib71","doi-asserted-by":"crossref","unstructured":"Rigney C, Willens S, Rubens A, Simpson W. RFC 2865 \u2013 remote authentication dial in user service (RADIUS); 2000.","DOI":"10.17487\/rfc2865"},{"key":"10.1016\/j.jnca.2015.09.014_bib72","unstructured":"Shaw ED, Stock HV. Behavioral risk indicators of malicious insider theft of intellectual property: misreading the writing on the wall; 2011. URL \u3008http:\/\/www.symantec.com\/content\/en\/us\/about\/media\/pdfs\/symc_malicious_insider_whitepaper_Dec_2011.pdf\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib73","doi-asserted-by":"crossref","unstructured":"Sousa J, Bessani A. From byzantine consensus to BFT state machine replication: a latency-optimal transformation. In: EDCC; 2012. p. 37\u201348.","DOI":"10.1109\/EDCC.2012.32"},{"issue":"1","key":"10.1016\/j.jnca.2015.09.014_bib74","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","article-title":"A survey on security issues in service delivery models of cloud computing","volume":"34","author":"Subashini","year":"2011","journal-title":"J Netw Comput Appl"},{"key":"10.1016\/j.jnca.2015.09.014_bib75","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1016\/j.cose.2012.02.005","article-title":"Systematically breaking and fixing openid security","author":"Sun","year":"2012","journal-title":"Comput Secur"},{"key":"10.1016\/j.jnca.2015.09.014_bib76","unstructured":"SyndiGate.info. Targeted cyber attacks to become \u2018rampant\u2019 in the middle east; November 2014. URL \u3008http:\/\/www.albawaba.com\/business\/middle-east-cyber-security\u2013620859\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib77","doi-asserted-by":"crossref","unstructured":"Tankard C. Advanced persistent threats and how to monitor and deter them. Netw Secur 2011 (8).","DOI":"10.1016\/S1353-4858(11)70086-1"},{"key":"10.1016\/j.jnca.2015.09.014_bib78","unstructured":"TERENA Task Force on Mobility. eduroam (education roaming); 2011 . \u3008http:\/\/www.eduroam.org\/\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib79","unstructured":"TrendLabs. The invisible becomes visible. Technical report. Trend Micro, contact: \u3008pr@trendmicro.com.au\u3009; November 2014. URL \u3008http:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/reports\/rpt-the-invisible-becomes-visible.pdf\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib80","doi-asserted-by":"crossref","unstructured":"Urien P, Dandjinou M. Introducing smartcard enabled RADIUS server. In: International symposium on collaborative technologies and systems; May 2006. p. 74\u201380.","DOI":"10.1109\/CTS.2006.54"},{"key":"10.1016\/j.jnca.2015.09.014_bib81","doi-asserted-by":"crossref","unstructured":"Urien P, Marie E, Kiennert C. An innovative solution for cloud computing authentication: grids of EAP-TLS smart cards. In: Fifth international conference on digital telecommunications (ICDT); 2010. p. 22\u20137.","DOI":"10.1109\/ICDT.2010.12"},{"issue":"January (1)","key":"10.1016\/j.jnca.2015.09.014_bib82","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/s00607-010-0140-x","article-title":"Locking the sky","volume":"91","author":"Vaquero","year":"2011","journal-title":"Computing"},{"key":"10.1016\/j.jnca.2015.09.014_bib83","first-page":"615","article-title":"Intrusion-resilient middleware design and validation","volume":"4","author":"Verissimo","year":"2009","journal-title":"Inf Assur Secur Priv Serv"},{"issue":"July\u2013August (4)","key":"10.1016\/j.jnca.2015.09.014_bib84","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MSP.2006.95","article-title":"Intrusion-tolerant middleware","volume":"4","author":"Verissimo","year":"2006","journal-title":"IEEE Secur Priv"},{"key":"10.1016\/j.jnca.2015.09.014_bib85","doi-asserted-by":"crossref","unstructured":"Ver\u00edssimo PE. Travelling through wormholes: a new look at distributed systems models. SIGACT News 37; March 2006.","DOI":"10.1145\/1122480.1122497"},{"key":"10.1016\/j.jnca.2015.09.014_bib86","first-page":"3","article-title":"Intrusion-tolerant architectures","volume":"vol. 2677","author":"Ver\u00edssimo","year":"2003"},{"key":"10.1016\/j.jnca.2015.09.014_bib87","unstructured":"Verizon. 2015 data breach investigations report. Technical report. Verizon; 2015. URL \u3008http:\/\/www.verizonenterprise.com\/DBIR\/2015\/\u3009."},{"key":"10.1016\/j.jnca.2015.09.014_bib88","unstructured":"Verizon RISK Team. Data breach investigations report. Technical report. Verizon; 2013 \u3008goo.gl\/7mIBy\u3009 [retrieved: March, 2014]."},{"key":"10.1016\/j.jnca.2015.09.014_bib89","doi-asserted-by":"crossref","unstructured":"Whitehouse News. Presidential proclamation\u2014critical infrastructure security and resilience month; October 2014. URL \u3008http:\/\/goo.gl\/Ord7Bn\u3009.","DOI":"10.1016\/j.ijcip.2014.01.002"},{"key":"10.1016\/j.jnca.2015.09.014_bib90","unstructured":"Winkler I. How to create awareness of the insider threat; April 2014. URL \u3008http:\/\/www.computerworld.com\/article\/2488234\/data-center\/how-to-create-awareness-of-the-insider-threat.html\u3009."}],"container-title":["Journal of Network and Computer Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1084804516000539?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1084804516000539?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,6,4]],"date-time":"2022-06-04T02:33:07Z","timestamp":1654309987000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1084804516000539"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":90,"alternative-id":["S1084804516000539"],"URL":"https:\/\/doi.org\/10.1016\/j.jnca.2015.09.014","relation":{},"ISSN":["1084-8045"],"issn-type":[{"value":"1084-8045","type":"print"}],"subject":[],"published":{"date-parts":[[2016,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A cyber-resilient architecture for critical security services","name":"articletitle","label":"Article Title"},{"value":"Journal of Network and Computer Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jnca.2015.09.014","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2016 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}