{"id":"https://openalex.org/W2133844241","doi":"https://doi.org/10.1109/apsec.2006.50","title":"Secrobat: Secure and Robust Component-based Architectures","display_name":"Secrobat: Secure and Robust Component-based Architectures","publication_year":2006,"publication_date":"2006-12-01","ids":{"openalex":"https://openalex.org/W2133844241","doi":"https://doi.org/10.1109/apsec.2006.50","mag":"2133844241"},"language":"en","primary_location":{"id":"doi:10.1109/apsec.2006.50","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsec.2006.50","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2006 13th Asia Pacific Software Engineering Conference (APSEC'06)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/conference_contribution/Secrobat_Secure_and_robust_component-based_architectures/26248949","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025545884","display_name":"Artem Vorobiev","orcid":"https://orcid.org/0000-0002-3037-9088"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Artem Vorobiev","raw_affiliation_strings":["Faculty of ICT, Swinburne University of Technology, Melbourne, Australia","[Fac. of lCT, Swinburne Univ. of Technol., Melbourne, VIC]"],"affiliations":[{"raw_affiliation_string":"Faculty of ICT, Swinburne University of Technology, Melbourne, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"[Fac. of lCT, Swinburne Univ. of Technol., Melbourne, VIC]","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050928648","display_name":"Jun Han","orcid":"https://orcid.org/0000-0002-0909-1688"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jun Han","raw_affiliation_strings":["Faculty of ICT, Swinburne University of Technology, Melbourne, Australia","[Fac. of lCT, Swinburne Univ. of Technol., Melbourne, VIC]"],"affiliations":[{"raw_affiliation_string":"Faculty of ICT, Swinburne University of Technology, Melbourne, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"[Fac. of lCT, Swinburne Univ. of Technol., Melbourne, VIC]","institution_ids":["https://openalex.org/I57093077"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5025545884"],"corresponding_institution_ids":["https://openalex.org/I57093077"],"apc_list":null,"apc_paid":null,"fwci":0.4652,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.75450292,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"3","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7636127471923828},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.6848803758621216},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5526469945907593},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5177890062332153},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5136303305625916},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49342408776283264},{"id":"https://openalex.org/keywords/software-architecture","display_name":"Software architecture","score":0.42213889956474304},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3724985122680664},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3539954721927643},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11400911211967468}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7636127471923828},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.6848803758621216},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5526469945907593},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5177890062332153},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5136303305625916},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49342408776283264},{"id":"https://openalex.org/C35869016","wikidata":"https://www.wikidata.org/wiki/Q846636","display_name":"Software architecture","level":3,"score":0.42213889956474304},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3724985122680664},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3539954721927643},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11400911211967468},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1109/apsec.2006.50","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsec.2006.50","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2006 13th Asia Pacific Software Engineering Conference (APSEC'06)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.298.3612","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.298.3612","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.ict.swin.edu.au/personal/jhan/jhanPapers/apsec06secrobat.pdf","raw_type":"text"},{"id":"pmh:oai:figshare.com:article/26248949","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Secrobat_Secure_and_robust_component-based_architectures/26248949","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:researchbank.swinburne.edu.au:b6d59d2c-400b-4d65-add5-1ae08e91452d/1","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.3/5907","pdf_url":null,"source":{"id":"https://openalex.org/S4306401157","display_name":"Swinburne Research Bank (Swinburne University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I57093077","host_organization_name":"Swinburne University of Technology","host_organization_lineage":["https://openalex.org/I57093077"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"13th Asia Pacific Software Engineering Conference (APSEC 2006), Bangalore, India, 06-08 December 2006, pp. 3-10","raw_type":"publishedVersion"},{"id":"doi:10.25916/sut.26248949.v1","is_oa":true,"landing_page_url":"https://doi.org/10.25916/sut.26248949.v1","pdf_url":null,"source":{"id":"https://openalex.org/S4306401157","display_name":"Swinburne Research Bank (Swinburne University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I57093077","host_organization_name":"Swinburne University of Technology","host_organization_lineage":["https://openalex.org/I57093077"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/26248949","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Secrobat_Secure_and_robust_component-based_architectures/26248949","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4000000059604645}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W652748195","https://openalex.org/W906733199","https://openalex.org/W971468451","https://openalex.org/W1498306255","https://openalex.org/W1548605912","https://openalex.org/W1984959361","https://openalex.org/W1990911977","https://openalex.org/W2029414465","https://openalex.org/W2057597039","https://openalex.org/W2065769502","https://openalex.org/W2100653580","https://openalex.org/W2104023883","https://openalex.org/W2115331666","https://openalex.org/W2132717590","https://openalex.org/W2133884536","https://openalex.org/W2136294927","https://openalex.org/W2144642244","https://openalex.org/W2148336220","https://openalex.org/W2183693782","https://openalex.org/W2202860973","https://openalex.org/W2986179470","https://openalex.org/W3103071483","https://openalex.org/W6621774147","https://openalex.org/W6624235919","https://openalex.org/W6629888259","https://openalex.org/W6657725327","https://openalex.org/W6675563988","https://openalex.org/W6675685647","https://openalex.org/W6686329536","https://openalex.org/W6927336650"],"related_works":["https://openalex.org/W2357256365","https://openalex.org/W2348502264","https://openalex.org/W2365486383","https://openalex.org/W2362059367","https://openalex.org/W2901443725","https://openalex.org/W2350084742","https://openalex.org/W2357988862","https://openalex.org/W1855558850","https://openalex.org/W2140798747","https://openalex.org/W2948169060"],"abstract_inverted_index":{"Software":[0],"systems,":[1,90,93],"component-based":[2],"systems":[3,107],"(CBS)":[4],"in":[5,114],"particular,":[6,105],"have":[7,51],"a":[8,37,77,81,127],"lot":[9],"of":[10,120],"vulnerabilities":[11],"that":[12,36],"may":[13],"be":[14,109],"exploited":[15],"by":[16,94],"intruders.":[17],"Companies":[18],"spend":[19],"much":[20],"time":[21],"and":[22,66,88,97,112,122,135,146,149],"money":[23],"to":[24,33,44,85,116],"\"patch":[25],"\"":[26],"them":[27],"up.":[28],"It":[29,138],"is":[30,76,160],"partly":[31],"due":[32],"the":[34,45,64,68,101,147,153],"fact":[35],"system's":[38],"security":[39,57,72,98],"features":[40,58,142],"are":[41,59],"often":[42],"added":[43],"system":[46,56,69],"after":[47],"its":[48],"functional":[49,96],"requirements":[50,99],"been":[52],"addressed.":[53],"As":[54],"such,":[55],"not":[60],"systematically":[61],"designed":[62],"into":[63],"system,":[65],"consequently":[67],"has":[70,139],"inherent":[71],"\"holes\".":[73],"Therefore,":[74],"there":[75],"strong":[78],"need":[79],"for":[80,132],"systematic":[82],"engineering":[83],"approach":[84],"developing":[86],"secure":[87,134],"robust":[89,136],"especially":[91],"distributed":[92],"considering":[95],"at":[100],"same":[102],"time.":[103],"In":[104],"these":[106],"should":[108],"highly":[110],"adaptive":[111,148],"reconfigurable":[113,150],"order":[115],"resist":[117],"different":[118],"types":[119],"attacks":[121],"failures.":[123],"This":[124],"paper":[125],"introduces":[126],"reference":[128,158],"architecture,":[129],"called":[130],"Secrobat,":[131],"creating":[133],"CBS.":[137],"several":[140],"key":[141],"including":[143],"defensive":[144],"components":[145],"architecture":[151,159],"with":[152,162],"hybrid":[154],"peer/super-peer":[155],"structure.":[156],"The":[157],"illustrated":[161],"an":[163],"example":[164],"gaming":[165],"system.":[166]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
