{"id":"https://openalex.org/W2122872182","doi":"https://doi.org/10.1109/discex.2003.1194955","title":"Intrusion tolerant distributed object systems: project summary","display_name":"Intrusion tolerant distributed object systems: project summary","publication_year":2004,"publication_date":"2004-03-22","ids":{"openalex":"https://openalex.org/W2122872182","doi":"https://doi.org/10.1109/discex.2003.1194955","mag":"2122872182"},"language":"en","primary_location":{"id":"doi:10.1109/discex.2003.1194955","is_oa":false,"landing_page_url":"https://doi.org/10.1109/discex.2003.1194955","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings DARPA Information Survivability Conference and Exposition","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071936672","display_name":"G. Tally","orcid":null},"institutions":[{"id":"https://openalex.org/I72951846","display_name":"Washington State University","ror":"https://ror.org/05dk0ce17","country_code":"US","type":"education","lineage":["https://openalex.org/I72951846"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"G. Tally","raw_affiliation_strings":["Network Associates Laboratories, Washington State University, USA"],"affiliations":[{"raw_affiliation_string":"Network Associates Laboratories, Washington State University, USA","institution_ids":["https://openalex.org/I72951846"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063076044","display_name":"B. Whitmore","orcid":null},"institutions":[{"id":"https://openalex.org/I72951846","display_name":"Washington State University","ror":"https://ror.org/05dk0ce17","country_code":"US","type":"education","lineage":["https://openalex.org/I72951846"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"B. Whitmore","raw_affiliation_strings":["Network Associates Laboratories, Washington State University, USA"],"affiliations":[{"raw_affiliation_string":"Network Associates Laboratories, Washington State University, USA","institution_ids":["https://openalex.org/I72951846"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020172690","display_name":"D. Sames","orcid":null},"institutions":[{"id":"https://openalex.org/I72951846","display_name":"Washington State University","ror":"https://ror.org/05dk0ce17","country_code":"US","type":"education","lineage":["https://openalex.org/I72951846"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"D. Sames","raw_affiliation_strings":["Network Associates Laboratories, Washington State University, USA"],"affiliations":[{"raw_affiliation_string":"Network Associates Laboratories, Washington State University, USA","institution_ids":["https://openalex.org/I72951846"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021445369","display_name":"Brian J. Matt","orcid":null},"institutions":[{"id":"https://openalex.org/I72951846","display_name":"Washington State University","ror":"https://ror.org/05dk0ce17","country_code":"US","type":"education","lineage":["https://openalex.org/I72951846"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"B. Matt","raw_affiliation_strings":["Network Associates Laboratories, Washington State University, USA"],"affiliations":[{"raw_affiliation_string":"Network Associates Laboratories, Washington State University, USA","institution_ids":["https://openalex.org/I72951846"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053422274","display_name":"B. Niebuhr","orcid":null},"institutions":[{"id":"https://openalex.org/I72951846","display_name":"Washington State University","ror":"https://ror.org/05dk0ce17","country_code":"US","type":"education","lineage":["https://openalex.org/I72951846"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"B. Niebuhr","raw_affiliation_strings":["Network Associates Laboratories, Washington State University, USA"],"affiliations":[{"raw_affiliation_string":"Network Associates Laboratories, Washington State University, USA","institution_ids":["https://openalex.org/I72951846"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111431329","display_name":"D.E. Bakken","orcid":null},"institutions":[{"id":"https://openalex.org/I72951846","display_name":"Washington State University","ror":"https://ror.org/05dk0ce17","country_code":"US","type":"education","lineage":["https://openalex.org/I72951846"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"D. Bakken","raw_affiliation_strings":["Network Associates Laboratories, Washington State University, USA"],"affiliations":[{"raw_affiliation_string":"Network Associates Laboratories, Washington State University, USA","institution_ids":["https://openalex.org/I72951846"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5071936672"],"corresponding_institution_ids":["https://openalex.org/I72951846"],"apc_list":null,"apc_paid":null,"fwci":0.2317,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.64416788,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":null,"first_page":"149","last_page":"151"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/common-object-request-broker-architecture","display_name":"Common Object Request Broker Architecture","score":0.8861615657806396},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8326177597045898},{"id":"https://openalex.org/keywords/distributed-object","display_name":"Distributed object","score":0.695466160774231},{"id":"https://openalex.org/keywords/intrusion-tolerance","display_name":"Intrusion tolerance","score":0.6311139464378357},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.6119886040687561},{"id":"https://openalex.org/keywords/middleware","display_name":"Middleware (distributed applications)","score":0.5925597548484802},{"id":"https://openalex.org/keywords/byzantine-fault-tolerance","display_name":"Byzantine fault tolerance","score":0.5695396065711975},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.5308198928833008},{"id":"https://openalex.org/keywords/single-point-of-failure","display_name":"Single point of failure","score":0.5042597055435181},{"id":"https://openalex.org/keywords/distributed-system-security-architecture","display_name":"Distributed System Security Architecture","score":0.45459654927253723},{"id":"https://openalex.org/keywords/interoperable-object-reference","display_name":"Interoperable Object Reference","score":0.45226070284843445},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.44722050428390503},{"id":"https://openalex.org/keywords/object-request-broker","display_name":"Object request broker","score":0.4262196719646454},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.42044365406036377},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.3842122256755829},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3609038293361664},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3324860632419586},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29445645213127136},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.0970589816570282}],"concepts":[{"id":"https://openalex.org/C49312422","wikidata":"https://www.wikidata.org/wiki/Q691593","display_name":"Common Object Request Broker Architecture","level":2,"score":0.8861615657806396},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8326177597045898},{"id":"https://openalex.org/C81192388","wikidata":"https://www.wikidata.org/wiki/Q5283169","display_name":"Distributed object","level":3,"score":0.695466160774231},{"id":"https://openalex.org/C196903269","wikidata":"https://www.wikidata.org/wiki/Q6059063","display_name":"Intrusion tolerance","level":3,"score":0.6311139464378357},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6119886040687561},{"id":"https://openalex.org/C169468491","wikidata":"https://www.wikidata.org/wiki/Q146923","display_name":"Middleware (distributed applications)","level":2,"score":0.5925597548484802},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.5695396065711975},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.5308198928833008},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.5042597055435181},{"id":"https://openalex.org/C77290126","wikidata":"https://www.wikidata.org/wiki/Q5283128","display_name":"Distributed System Security Architecture","level":5,"score":0.45459654927253723},{"id":"https://openalex.org/C204671669","wikidata":"https://www.wikidata.org/wiki/Q1413463","display_name":"Interoperable Object Reference","level":4,"score":0.45226070284843445},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.44722050428390503},{"id":"https://openalex.org/C48914193","wikidata":"https://www.wikidata.org/wiki/Q1366152","display_name":"Object request broker","level":4,"score":0.4262196719646454},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.42044365406036377},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.3842122256755829},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3609038293361664},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3324860632419586},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29445645213127136},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0970589816570282},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/discex.2003.1194955","is_oa":false,"landing_page_url":"https://doi.org/10.1109/discex.2003.1194955","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings DARPA Information Survivability Conference and Exposition","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6499999761581421,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1996360405","https://openalex.org/W2073126252","https://openalex.org/W2077409330","https://openalex.org/W2126087831","https://openalex.org/W2139659447","https://openalex.org/W2152465173","https://openalex.org/W2154835755","https://openalex.org/W3137092842","https://openalex.org/W3145042860","https://openalex.org/W4232836212","https://openalex.org/W6668800903","https://openalex.org/W6669831648","https://openalex.org/W6675220417","https://openalex.org/W6678832241"],"related_works":["https://openalex.org/W1500100713","https://openalex.org/W1521693992","https://openalex.org/W893592669","https://openalex.org/W2201639453","https://openalex.org/W2377023488","https://openalex.org/W8106001","https://openalex.org/W1524224399","https://openalex.org/W1587389907","https://openalex.org/W2372346798","https://openalex.org/W2363005332"],"abstract_inverted_index":{"Intrusion":[0,60],"prevention":[1],"mechanisms":[2],"and":[3,10,39,139],"technologies":[4],"cannot":[5],"always":[6],"prevent":[7],"a":[8,22,48,110,124],"well-funded":[9],"persistent":[11],"adversary":[12],"from":[13],"penetrating":[14],"information":[15,83],"systems.":[16],"Middleware":[17],"is":[18,31,47,67],"one":[19,96],"area":[20],"where":[21],"system":[23],"can":[24,77,103,128],"provide":[25,78],"intrusion":[26],"tolerance.":[27],"Distributed":[28,62],"object":[29,54,74,91],"middleware":[30,100],"considered":[32],"the":[33,40,98,107,121,136,141],"most":[34],"general":[35],"kind":[36],"of":[37,58,97,113,123,143,146],"middleware,":[38],"Common":[41],"Object":[42,63],"Request":[43],"Broker":[44],"Architecture":[45],"(CORBA)":[46],"widely":[49],"adopted":[50],"standard":[51],"for":[52,72,81],"distributed":[53,73],"middleware.":[55],"The":[56],"goal":[57],"our":[59],"Tolerant":[61],"Systems":[64],"(ITDOS)":[65],"framework":[66],"to":[68],"create":[69],"an":[70],"architecture":[71,116],"systems":[75,84,94],"that":[76,102,127],"high":[79],"reliability":[80],"mission-critical":[82],"by":[85,106],"tolerating":[86],"Byzantine":[87,130],"(arbitrary)":[88],"faults":[89],"in":[90,120],"servers.":[92],"CORBA":[93],"are":[95],"potential":[99],"architectures":[101],"be":[104],"supported":[105],"architecture.":[108],"From":[109],"system-level":[111],"point":[112],"view,":[114],"this":[115],"provides":[117],"additional":[118],"security":[119],"form":[122],"firewall":[125],"proxy":[126],"monitor":[129],"fault-tolerant":[131],"multicast":[132],"(BFTM)":[133],"messages":[134],"at":[135],"enclave":[137],"boundary":[138],"minimize":[140],"impact":[142],"certain":[144],"denial":[145],"service":[147],"(DoS)":[148],"attacks.":[149]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
