{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:55:33Z","timestamp":1729644933171,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cmpsac.2002.1044562","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T23:45:08Z","timestamp":1056584708000},"page":"271-276","source":"Crossref","is-referenced-by-count":1,"title":["Reducing risks of widespread faults and attacks for commercial software applications: towards diversity of software components"],"prefix":"10.1109","author":[{"given":"M.","family":"Casassa Mont","sequence":"first","affiliation":[]},{"given":"A.","family":"Baldwin","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Beres","sequence":"additional","affiliation":[]},{"given":"K.","family":"Harrison","sequence":"additional","affiliation":[]},{"given":"M.","family":"Sadler","sequence":"additional","affiliation":[]},{"given":"S.","family":"Shiu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/24.229486"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/52.636672"},{"key":"18","first-page":"135","article-title":"A large scale experiment in N-version programming -","author":"knight","year":"1985","journal-title":"Proc 15th Int l Symp Fault-Tolerant Computing (FTCS-15)"},{"key":"15","article-title":"Fault tolerant and fail-safe design of CANDU computerised shutdown systems -","author":"condor","year":"0","journal-title":"IAEA Meeting London - 1988"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-024453-2.50016-4"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/WECWIS.2000.853867"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CDCS.2001.918691"},{"key":"11","article-title":"Trust services: Reducing risk in E-commerce","author":"baldwin","year":"2001","journal-title":"ICECR-4 -"},{"journal-title":"UDDI Version 3 0 Specification","year":"2001","author":"mckee","key":"12"},{"year":"2001","key":"21"},{"key":"3","first-page":"3","article-title":"Dependability of the 777 primary flight control system. -","volume":"5","author":"yeh","year":"1998","journal-title":"Dependable Computing for Critical Applications"},{"year":"2001","key":"20","article-title":"CAIDA analysis of code red, code-red worms: A global threat -"},{"key":"2","article-title":"On the implementation of N-version programming for software fault tolerance during execution -","author":"avizienis","year":"1977","journal-title":"COMPSAC 1977"},{"key":"1","article-title":"Design diversity and the immune system paradigm: Cornerstones for information system survivability -","author":"avizienis","year":"2000","journal-title":"ISW2000 -"},{"journal-title":"The Unified Modelling Language User Guide","year":"1999","author":"booch","key":"10"},{"article-title":"Systematic generation of stochastic diversity as an intrusion barrier in survivable systems software -","year":"2001","author":"linger","key":"7"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.21236\/ADA341963","article-title":"Survivable network systems: An emerging discipline -","author":"ellison","year":"1997"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6313048"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1993.627364"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0713-2_11"},{"key":"8","article-title":"Analyzing programs for vulnerability to buffer overrun attacks -","author":"ghosh","year":"0","journal-title":"21st National Information Systems Security Conference Crystal City VA - October 5-8 1998"}],"event":{"name":"26th Annual International Computer Software and Applications","acronym":"CMPSAC-02","location":"Oxford, UK"},"container-title":["Proceedings 26th Annual International Computer Software and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8094\/22390\/01044562.pdf?arnumber=1044562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,24]],"date-time":"2018-02-24T23:39:49Z","timestamp":1519515589000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1044562\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/cmpsac.2002.1044562","relation":{},"subject":[]}}