{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T05:42:04Z","timestamp":1725428524049},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006,8]]},"DOI":"10.1109\/seccomw.2006.359560","type":"proceedings-article","created":{"date-parts":[[2007,5,30]],"date-time":"2007-05-30T20:33:00Z","timestamp":1180557180000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Mithril: Adaptable Security for Survivability in Collaborative Computing Sites"],"prefix":"10.1109","author":[{"given":"Jim","family":"Basney","sequence":"first","affiliation":[]},{"given":"Patrick","family":"Flanigan","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Heo","sequence":"additional","affiliation":[]},{"given":"Himanshu","family":"Khurana","sequence":"additional","affiliation":[]},{"given":"Joe","family":"Muggli","sequence":"additional","affiliation":[]},{"given":"Meenal","family":"Pant","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Slagell","sequence":"additional","affiliation":[]},{"given":"Von","family":"Welch","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.17487\/rfc4252","article-title":"The Secure Shell (SSH) Authentication Protocol","author":"ylonen","year":"2006"},{"key":"ref11","article-title":"Inoculating SSH Against Address Harvesting","author":"schechter","year":"2006","journal-title":"Network and Distributed System Security Symposium (NDSS)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/spe.688"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.17487\/rfc3820","article-title":"Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile)","author":"tuecke","year":"2004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1066752"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1036921.1036923"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1036921.1036933"},{"key":"ref5","article-title":"The Willow Architecture: Comprehensive Survivability for Large-Scale Distributed Applications","author":"knight","year":"2002","journal-title":"Intrusion Tolerance Workshop DSN-2002 The International Conference on Dependable Systems and Networks"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/996943.996947"},{"key":"ref2","article-title":"Requirements and Solutions for Secure Mailing Lists","author":"heo","year":"2006","journal-title":"Technical Report"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2003.1203540"},{"key":"ref9","article-title":"Snort – lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"proceedings of Usenix LISA"}],"event":{"name":"2006 Securecomm and Workshops","start":{"date-parts":[[2006,8,28]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2006,9,1]]}},"container-title":["2006 Securecomm and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4198788\/4198789\/04198820.pdf?arnumber=4198820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T13:27:18Z","timestamp":1556458038000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4198820\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,8]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/seccomw.2006.359560","relation":{},"subject":[],"published":{"date-parts":[[2006,8]]}}}