{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:42:58Z","timestamp":1742395378131,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2003,10,31]]},"DOI":"10.1145\/1036921.1036924","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"23-32","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["Security analysis of SITAR intrusion tolerance system"],"prefix":"10.1145","author":[{"given":"Dazhi","family":"Wang","sequence":"first","affiliation":[{"name":"Duke University, NC"}]},{"given":"Bharat B.","family":"Madan","sequence":"additional","affiliation":[{"name":"Duke University, NC"}]},{"given":"Kishor S.","family":"Trivedi","sequence":"additional","affiliation":[{"name":"Duke University, NC"}]}],"member":"320","published-online":{"date-parts":[[2003,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/online.securityfocus.com. http:\/\/online.securityfocus.com."},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/www.cert.org. http:\/\/www.cert.org."},{"key":"e_1_3_2_1_3_1","unstructured":"Spnp user's manual version 6.0. http:\/\/www.ee.duke.edu\/ chirel\/MANUAL\/manual.pdf. Spnp user's manual version 6.0. http:\/\/www.ee.duke.edu\/ chirel\/MANUAL\/manual.pdf."},{"key":"e_1_3_2_1_4_1","volume-title":"Dept. of Defense, no. DoD 5200.28.STD","author":"System Evaluation Trusted Computer","year":"1985","unstructured":"Trusted Computer System Evaluation Criteria ( Orange Book). National Computer Security Center , Dept. of Defense, no. DoD 5200.28.STD , 1985 . Trusted Computer System Evaluation Criteria (Orange Book). National Computer Security Center, Dept. of Defense, no. DoD 5200.28.STD, 1985."},{"key":"e_1_3_2_1_5_1","volume-title":"Validation Framework Workshop Discussions, DARPA OASIS PIs Mtg.","author":"In","year":"2002","unstructured":"In Validation Framework Workshop Discussions, DARPA OASIS PIs Mtg. , Hilton Head, SC , March 11-15, 2002 . In Validation Framework Workshop Discussions, DARPA OASIS PIs Mtg., Hilton Head, SC, March 11-15, 2002."},{"key":"e_1_3_2_1_6_1","first-page":"7024","article-title":"Provisional Harmonized Criteria","volume":"92","author":"Security Evaluation Information Technology","year":"1993","unstructured":"Information Technology Security Evaluation Criteria (ITSEC) : Provisional Harmonized Criteria . ISBN 92-826 - 7024 - 7024 , Dec. 1993 . Information Technology Security Evaluation Criteria (ITSEC):Provisional Harmonized Criteria. ISBN 92-826-7024-4, Dec. 1993.","journal-title":"ISBN"},{"key":"e_1_3_2_1_7_1","volume-title":"Correlation, Trace back, Traps, and Response. Intrusion","author":"Amoroso E.","year":"1999","unstructured":"E. Amoroso . Intrusion Detection: An Introduction to Internet Surveillance , Correlation, Trace back, Traps, and Response. Intrusion . Net Books , 1 edition, January , 1999 . E. Amoroso. Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace back, Traps, and Response. Intrusion.Net Books, 1 edition, January, 1999."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.151.0102"},{"key":"e_1_3_2_1_9_1","volume-title":"Computer Security Handbook","author":"Bosworth S.","year":"2002","unstructured":"S. Bosworth and M.E. Kabay . Computer Security Handbook , Fourth Edition. John Wiley , 2002 . S. Bosworth and M.E. Kabay. Computer Security Handbook, Fourth Edition. John Wiley, 2002."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/647882.738080"},{"key":"e_1_3_2_1_11_1","first-page":"605","volume-title":"Proc. IEEE Int. Conf. Dependable System and Networks (DSN03)","author":"Chen S.","year":"2003","unstructured":"S. Chen , Z. Kalbarczyk , J. Xu , and R.K. Iyer . A data-driven finite state machine model for analyzing security vulnerabilities . In Proc. IEEE Int. Conf. Dependable System and Networks (DSN03) , pages 605 - 614 , 2003 . S. Chen, Z. Kalbarczyk, J. Xu, and R.K. Iyer. A data-driven finite state machine model for analyzing security vulnerabilities. In Proc. IEEE Int. Conf. Dependable System and Networks (DSN03), pages 605-614, 2003."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/0166-5316(91)90003-L"},{"key":"e_1_3_2_1_13_1","volume-title":"LAAS research Rept.","author":"Dacier M.","year":"1996","unstructured":"M. Dacier , Y. Deswarte , and M. Ka\u00e2niche . Quantitative assessment of operational security: Models and tools. Technical report , LAAS research Rept. 96493, May , 1996 . M. Dacier, Y. Deswarte, and M. Ka\u00e2niche. Quantitative assessment of operational security: Models and tools. Technical report, LAAS research Rept. 96493, May, 1996."},{"key":"e_1_3_2_1_14_1","first-page":"203","volume-title":"Proc. 3rd Conf. on Computer Security, IFIP\/SEC'85","author":"Fraga J. Da Silva","year":"1985","unstructured":"J. Da Silva Fraga and D. Powell . A fault and intrusion tolerant file system . In Proc. 3rd Conf. on Computer Security, IFIP\/SEC'85 , pages 203 - 218 , August 1985 . J. Da Silva Fraga and D. Powell. A fault and intrusion tolerant file system. In Proc. 3rd Conf. on Computer Security, IFIP\/SEC'85, pages 203-218, August 1985."},{"issue":"4","key":"e_1_3_2_1_15_1","first-page":"1","article-title":"Questions and answers about tiger teams. EDPACS, The EDP Audit","volume":"27","author":"Goldis P.D.","year":"1989","unstructured":"P.D. Goldis . Questions and answers about tiger teams. EDPACS, The EDP Audit , Control and Security Newsletter , 27 ( 4 ): 1 - 10 , Oct. 1989 . P.D. Goldis. Questions and answers about tiger teams. EDPACS, The EDP Audit, Control and Security Newsletter, 27(4):1-10, Oct. 1989.","journal-title":"Control and Security Newsletter"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932173"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(88)90336-7"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/874064.875631"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.588541"},{"key":"e_1_3_2_1_20_1","volume-title":"Darpa intrusion detection evaluation","author":"Lincoln Laboratory MIT","year":"1998","unstructured":"MIT Lincoln Laboratory . Darpa intrusion detection evaluation . 1998 . MIT Lincoln Laboratory. Darpa intrusion detection evaluation. 1998."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2699840.2699848"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/647883.738399"},{"key":"e_1_3_2_1_23_1","volume-title":"Network Intrusion Detection: An Analysts Handbook","author":"Northcut S.","year":"1999","unstructured":"S. Northcut . Network Intrusion Detection: An Analysts Handbook . New Riders Press , 1999 . S. Northcut. Network Intrusion Detection: An Analysts Handbook. New Riders Press, 1999."},{"key":"e_1_3_2_1_24_1","volume-title":"Network Intrusion Detection: An analysts Handbook","author":"Northcut S.","year":"2001","unstructured":"S. Northcut . Network Intrusion Detection: An analysts Handbook . New Riders Press , 2001 . S. Northcut. Network Intrusion Detection: An analysts Handbook. New Riders Press, 2001."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.815323"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the IEEE Information Survivability Workshop (ISW-2000)","author":"Pal P.P.","year":"2000","unstructured":"P.P. Pal , F. Webber , R.E. Schantz , and J.P. Loyall . Intrusion tolerant systems . Proceedings of the IEEE Information Survivability Workshop (ISW-2000) , 2000 . P.P. Pal, F. Webber, R.E. Schantz, and J.P. Loyall. Intrusion tolerant systems. Proceedings of the IEEE Information Survivability Workshop (ISW-2000), 2000."},{"key":"e_1_3_2_1_27_1","volume-title":"National Information Systems Security Conference","author":"Porras P.A.","year":"1997","unstructured":"P.A. Porras and P.G. Neumann . Emerald: Event monitoring enabling responses to anomalous live disturbances . National Information Systems Security Conference , 1997 . P.A. Porras and P.G. Neumann. Emerald: Event monitoring enabling responses to anomalous live disturbances. National Information Systems Security Conference, 1997."},{"key":"e_1_3_2_1_28_1","unstructured":"M. Roesch and C. Green. Snort users manual. http:\/\/www.snort.org\/docs\/writing-rules\/. M. Roesch and C. Green. Snort users manual. http:\/\/www.snort.org\/docs\/writing-rules\/."},{"key":"e_1_3_2_1_29_1","volume-title":"17th IFIP World Computer Congress","author":"Schantz R.","year":"2002","unstructured":"R. Schantz , F. Webber , P. Pal , J. Loyall , and D. C. Schmidt . Protecting applications against malice with adaptive middleware . In 17th IFIP World Computer Congress , Montreal, Canada , Aug. 2002 . R. Schantz, F. Webber, P. Pal, J. Loyall, and D. C. Schmidt. Protecting applications against malice with adaptive middleware. In 17th IFIP World Computer Congress, Montreal, Canada, Aug. 2002."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2003.1209971"},{"key":"e_1_3_2_1_31_1","volume-title":"DARPA Information Survivalability Conference and Exposition II","author":"Stavridou V.","year":"2001","unstructured":"V. Stavridou , B. Dutertre , R.A. Riemenschneider , and H. Saidi . Intrusion tolerant software architectures. DISCEX01 , DARPA Information Survivalability Conference and Exposition II , May , 2001 . V. Stavridou, B. Dutertre, R.A. Riemenschneider, and H. Saidi. Intrusion tolerant software architectures. DISCEX01, DARPA Information Survivalability Conference and Exposition II, May, 2001."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/829532.831330"},{"key":"e_1_3_2_1_33_1","first-page":"605","volume-title":"Conf. Dependable System and Networks (DSN02","author":"Uppalli R.","year":"2002","unstructured":"R. Uppalli , R. Wang , and F. Wang . Design of a ballot monitor for an intrusion tolerant system. In Fast abstract in IEEE Int . Conf. Dependable System and Networks (DSN02 , pages 605 - 614 , 2002 . R. Uppalli, R. Wang, and F. Wang. Design of a ballot monitor for an intrusion tolerant system. In Fast abstract in IEEE Int. Conf. Dependable System and Networks (DSN02, pages 605-614, 2002."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the IEEE 2nd SMC Information Assurance Workshop, United States Military Academy","author":"Wang F.","year":"2001","unstructured":"F. Wang , F. Gong , C. Sargor , K. Go\u0161eva-Popstojanova , K. S. Trivedi , and F. Jou . SITAR: A Scalable Intrusion Tolerance Architecture for Distributed Services . In Proceedings of the IEEE 2nd SMC Information Assurance Workshop, United States Military Academy , West Point, New York , June 5-6 2001 . F. Wang, F. Gong, C. Sargor, K. Go\u0161eva-Popstojanova, K. S. Trivedi, and F. Jou. SITAR: A Scalable Intrusion Tolerance Architecture for Distributed Services. In Proceedings of the IEEE 2nd SMC Information Assurance Workshop, United States Military Academy, West Point, New York, June 5-6 2001."}],"event":{"name":"CCS03: Tenth ACM Conference on Computer and Communications Security 2003","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Fairfax VA","acronym":"CCS03"},"container-title":["Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1036921.1036924","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T20:39:30Z","timestamp":1673296770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1036921.1036924"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,10,31]]},"references-count":34,"alternative-id":["10.1145\/1036921.1036924","10.1145\/1036921"],"URL":"https:\/\/doi.org\/10.1145\/1036921.1036924","relation":{},"subject":[],"published":{"date-parts":[[2003,10,31]]},"assertion":[{"value":"2003-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}