{"id":"https://openalex.org/W2020575278","doi":"https://doi.org/10.1145/1413140.1413162","title":"Towards practical intrusion tolerant systems","display_name":"Towards practical intrusion tolerant systems","publication_year":2008,"publication_date":"2008-05-12","ids":{"openalex":"https://openalex.org/W2020575278","doi":"https://doi.org/10.1145/1413140.1413162","mag":"2020575278"},"language":"en","primary_location":{"id":"doi:10.1145/1413140.1413162","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1413140.1413162","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065763841","display_name":"Wenbing Zhao","orcid":"https://orcid.org/0000-0002-3202-1127"},"institutions":[{"id":"https://openalex.org/I102607778","display_name":"Cleveland State University","ror":"https://ror.org/002tx1f22","country_code":"US","type":"education","lineage":["https://openalex.org/I102607778"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Wenbing Zhao","raw_affiliation_strings":["Cleveland State University, Cleveland, OH","Cleveland State University, Cleveland, Oh#TAB#"],"affiliations":[{"raw_affiliation_string":"Cleveland State University, Cleveland, OH","institution_ids":["https://openalex.org/I102607778"]},{"raw_affiliation_string":"Cleveland State University, Cleveland, Oh#TAB#","institution_ids":["https://openalex.org/I102607778"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5065763841"],"corresponding_institution_ids":["https://openalex.org/I102607778"],"apc_list":null,"apc_paid":null,"fwci":0.31801415,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.66794214,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6902647018432617},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.450010746717453},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23984870314598083}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6902647018432617},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.450010746717453},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23984870314598083}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1413140.1413162","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1413140.1413162","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6100000143051147}],"awards":[],"funders":[{"id":"https://openalex.org/F4320309105","display_name":"Cleveland State University","ror":"https://ror.org/002tx1f22"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2016463549","https://openalex.org/W2092911542","https://openalex.org/W2114579022","https://openalex.org/W2119565742","https://openalex.org/W2133201251","https://openalex.org/W2182688186","https://openalex.org/W3035757797","https://openalex.org/W4238584892"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3],"present":[4],"the":[5,40,44,47,52,68,80,83,105,125],"blueprint":[6],"of":[7,46,49,54,82,91],"a":[8,36,62,89,95],"novel":[9,96],"middleware":[10],"infrastructure":[11,27],"that":[12,102],"can":[13,75],"be":[14,31],"used":[15,100],"to":[16,30,115,118],"build":[17],"mission-critical":[18],"systems":[19],"with":[20],"increased":[21],"resiliency":[22],"against":[23,109],"intrusion":[24],"attacks.":[25],"The":[26],"is":[28,58,85,99,107,113],"designed":[29],"practical":[32],"and":[33,66,94,122,129,133],"it":[34,112],"imposes":[35],"well-defined":[37],"structure":[38],"on":[39],"application":[41,56],"by":[42,140,144],"adhering":[43],"principle":[45],"separation":[48],"concerns:":[50],"(1)":[51],"processing":[53],"each":[55],"request":[57],"carried":[59,138],"out":[60,139],"at":[61],"single":[63],"execution":[64,69,128],"node,":[65],"if":[67],"node":[70,74],"becomes":[71],"faulty,":[72],"another":[73],"take":[76],"over":[77],"immediately;":[78],"(2)":[79],"state":[81,92,106,120,130],"server":[84],"replicated":[86],"transparently":[87],"across":[88],"pool":[90],"replicas,":[93],"append-only":[97],"strategy":[98],"so":[101],"not":[103],"only":[104],"protected":[108],"hardware":[110],"failures,":[111],"resilient":[114],"attacks":[116],"aimed":[117],"cause":[119],"corruption":[121],"destruction;":[123],"(3)":[124],"fault":[126],"monitoring,":[127],"integrity":[131],"checking,":[132],"system":[134],"configuration":[135],"management":[136],"are":[137,146],"distinct":[141],"components":[142],"which":[143],"themselves":[145],"replicated.":[147]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
