{"id":"https://openalex.org/W2120895908","doi":"https://doi.org/10.1109/crisis.2008.4757468","title":"Security analysis of the Dependability, Security Reconfigurability framework","display_name":"Security analysis of the Dependability, Security Reconfigurability framework","publication_year":2008,"publication_date":"2008-10-01","ids":{"openalex":"https://openalex.org/W2120895908","doi":"https://doi.org/10.1109/crisis.2008.4757468","mag":"2120895908"},"language":"en","primary_location":{"id":"doi:10.1109/crisis.2008.4757468","is_oa":false,"landing_page_url":"https://doi.org/10.1109/crisis.2008.4757468","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 Third International Conference on Risks and Security of Internet and Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065790224","display_name":"Tim den Hartog","orcid":"https://orcid.org/0000-0003-0892-0242"},"institutions":[{"id":"https://openalex.org/I4210098600","display_name":"Noldus Information Technology","ror":"https://ror.org/00tzgse53","country_code":"NL","type":"company","lineage":["https://openalex.org/I4210098600"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Tim Hartog","raw_affiliation_strings":["Information Security Department, TNO Information and Communication Technology, Delft, The Netherlands","Inf. Security Dept., TNO Inf. & Commun. Technol., Delft"],"affiliations":[{"raw_affiliation_string":"Information Security Department, TNO Information and Communication Technology, Delft, The Netherlands","institution_ids":["https://openalex.org/I4210098600"]},{"raw_affiliation_string":"Inf. Security Dept., TNO Inf. & Commun. Technol., Delft","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018553561","display_name":"Geert Kleinhuis","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Geert Kleinhuis","raw_affiliation_strings":["Information Security Department, TNO Information and Communication Technology, Groningen, The Netherlands","Inf. Security Dept., TNO Inf. & Commun. Technol., Delft"],"affiliations":[{"raw_affiliation_string":"Information Security Department, TNO Information and Communication Technology, Groningen, The Netherlands","institution_ids":[]},{"raw_affiliation_string":"Inf. Security Dept., TNO Inf. & Commun. Technol., Delft","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5065790224"],"corresponding_institution_ids":["https://openalex.org/I4210098600"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.13148203,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2","issue":null,"first_page":"93","last_page":"100"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9803000092506409,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9803000092506409,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.953499972820282,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9283000230789185,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dependability","display_name":"Dependability","score":0.8932658433914185},{"id":"https://openalex.org/keywords/reconfigurability","display_name":"Reconfigurability","score":0.8239271640777588},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7007158398628235},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5636324882507324},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.46624699234962463},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.45871594548225403},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4577575623989105},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.45494744181632996},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.44523388147354126},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4233299791812897},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3894154727458954},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.38902485370635986},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.11700943112373352},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10661551356315613},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08099678158760071},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.0596373975276947}],"concepts":[{"id":"https://openalex.org/C77019957","wikidata":"https://www.wikidata.org/wiki/Q2689057","display_name":"Dependability","level":2,"score":0.8932658433914185},{"id":"https://openalex.org/C2780149590","wikidata":"https://www.wikidata.org/wiki/Q7302742","display_name":"Reconfigurability","level":2,"score":0.8239271640777588},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7007158398628235},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5636324882507324},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.46624699234962463},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.45871594548225403},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4577575623989105},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.45494744181632996},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.44523388147354126},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4233299791812897},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3894154727458954},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.38902485370635986},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.11700943112373352},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10661551356315613},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08099678158760071},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0596373975276947},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/crisis.2008.4757468","is_oa":false,"landing_page_url":"https://doi.org/10.1109/crisis.2008.4757468","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 Third International Conference on Risks and Security of Internet and Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1559498407","https://openalex.org/W2163757541","https://openalex.org/W2609238348","https://openalex.org/W2611901292"],"related_works":["https://openalex.org/W2008985775","https://openalex.org/W8370799","https://openalex.org/W2165898552","https://openalex.org/W2030343105","https://openalex.org/W2907868081","https://openalex.org/W1528506334","https://openalex.org/W2290724697","https://openalex.org/W2055319964","https://openalex.org/W2299494954","https://openalex.org/W2605865535"],"abstract_inverted_index":{"Introducing":[0],"security":[1,3,48,55,77],"and":[2,10,54,67,75],"functionality":[4],"in":[5,21,62],"a":[6,46,63],"large":[7,64],"scale":[8,65],"communication":[9,66],"information":[11,68],"system":[12],"will":[13],"increase":[14],"the":[15,38,51,71,87,93],"complexity":[16],"of":[17,29],"these":[18],"systems.":[19,32],"Complexity":[20],"general":[22],"is":[23,60],"seen":[24],"as":[25],"an":[26],"important":[27],"aspect":[28],"possible":[30],"insecure":[31],"In":[33],"this":[34],"paper":[35],"we":[36],"describe":[37],"threats":[39],"that":[40],"need":[41],"to":[42],"be":[43],"addressed":[44],"if":[45],"specific":[47],"solution":[49],"like":[50],"DESEREC":[52,88],"(dependability":[53],"by":[56,92],"enhanced":[57],"reconfigurability)":[58],"framework":[59],"deployed":[61],"system.":[69],"Also":[70],"necessary":[72],"minimal":[73],"countermeasures":[74],"corresponding":[76],"requirements":[78],"are":[79],"described.":[80],"This":[81],"work":[82],"reflects":[83],"our":[84],"experiences":[85],"within":[86],"project,":[89],"partly":[90],"funded":[91],"European":[94],"Union.":[95]},"counts_by_year":[{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
