{"id":"https://openalex.org/W1841854851","doi":"https://doi.org/10.1007/978-3-540-30207-0_52","title":"Autonomic Computing for Defense-in-Depth Information Assurance: Architecture and a Case Study","display_name":"Autonomic Computing for Defense-in-Depth Information Assurance: Architecture and a Case Study","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W1841854851","doi":"https://doi.org/10.1007/978-3-540-30207-0_52","mag":"1841854851"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-30207-0_52","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-30207-0_52","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053112608","display_name":"Xin Xu","orcid":"https://orcid.org/0000-0003-3238-745X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xin Xu","raw_affiliation_strings":["Institute of Automation, National University of Defense Technology, 410073, Changsha, P.R. China","School of Computer, National University of Defense Technology, 410073, Changsha, P.R. China","Institute of Automation, National University of Defense Technology, Changsha, P.R. China","School of Computer, National University of Defense Technology, Changsha, P.R. China"],"affiliations":[{"raw_affiliation_string":"Institute of Automation, National University of Defense Technology, 410073, Changsha, P.R. China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"School of Computer, National University of Defense Technology, 410073, Changsha, P.R. China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"Institute of Automation, National University of Defense Technology, Changsha, P.R. China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"School of Computer, National University of Defense Technology, Changsha, P.R. China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047233009","display_name":"Zunguo Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zunguo Huang","raw_affiliation_strings":["School of Computer, National University of Defense Technology, 410073, Changsha, P.R. China","School of Computer, National University of Defense Technology, Changsha, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer, National University of Defense Technology, 410073, Changsha, P.R. China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"School of Computer, National University of Defense Technology, Changsha, P.R. China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049595861","display_name":"Lei Xuan","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Xuan","raw_affiliation_strings":["School of Computer, National University of Defense Technology, 410073, Changsha, P.R. China","School of Computer, National University of Defense Technology, Changsha, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer, National University of Defense Technology, 410073, Changsha, P.R. China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"School of Computer, National University of Defense Technology, Changsha, P.R. China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5053112608"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.23563398,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"414","last_page":"421"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/autonomic-computing","display_name":"Autonomic computing","score":0.8316341042518616},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8174607753753662},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.8007203340530396},{"id":"https://openalex.org/keywords/survivability","display_name":"Survivability","score":0.7719395160675049},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.59971022605896},{"id":"https://openalex.org/keywords/backup","display_name":"Backup","score":0.5893069505691528},{"id":"https://openalex.org/keywords/roaming","display_name":"Roaming","score":0.5334354639053345},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5044745206832886},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.47176888585090637},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.44327986240386963},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4388253688812256},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4321364164352417},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39936456084251404},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1565219759941101},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1442294418811798},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.12922608852386475}],"concepts":[{"id":"https://openalex.org/C558632462","wikidata":"https://www.wikidata.org/wiki/Q788172","display_name":"Autonomic computing","level":3,"score":0.8316341042518616},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8174607753753662},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.8007203340530396},{"id":"https://openalex.org/C2781133158","wikidata":"https://www.wikidata.org/wiki/Q1088669","display_name":"Survivability","level":2,"score":0.7719395160675049},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.59971022605896},{"id":"https://openalex.org/C2780945871","wikidata":"https://www.wikidata.org/wiki/Q194274","display_name":"Backup","level":2,"score":0.5893069505691528},{"id":"https://openalex.org/C194498986","wikidata":"https://www.wikidata.org/wiki/Q680016","display_name":"Roaming","level":2,"score":0.5334354639053345},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5044745206832886},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.47176888585090637},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.44327986240386963},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4388253688812256},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4321364164352417},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39936456084251404},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1565219759941101},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1442294418811798},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.12922608852386475},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-30207-0_52","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-30207-0_52","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.49000000953674316}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W5441257","https://openalex.org/W1985699615","https://openalex.org/W2034065435","https://openalex.org/W2057776033","https://openalex.org/W2106650751","https://openalex.org/W2108682287","https://openalex.org/W2171134421","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2369138185","https://openalex.org/W2387494004","https://openalex.org/W2162492390","https://openalex.org/W2350417149","https://openalex.org/W2945277231","https://openalex.org/W2036372418","https://openalex.org/W2545190132","https://openalex.org/W1841854851","https://openalex.org/W2370240436","https://openalex.org/W2362292629"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
