{"id":"https://openalex.org/W2131915327","doi":"https://doi.org/10.1145/2073276.2073286","title":"Resilience is more than availability","display_name":"Resilience is more than availability","publication_year":2011,"publication_date":"2011-09-12","ids":{"openalex":"https://openalex.org/W2131915327","doi":"https://doi.org/10.1145/2073276.2073286","mag":"2131915327"},"language":"en","primary_location":{"id":"doi:10.1145/2073276.2073286","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2073276.2073286","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 New Security Paradigms Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053448222","display_name":"Matt Bishop","orcid":null},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Matt Bishop","raw_affiliation_strings":["University of California at Davis, Davis, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California at Davis, Davis, CA, USA","institution_ids":["https://openalex.org/I84218800"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016664598","display_name":"Marco Carvalho","orcid":"https://orcid.org/0000-0002-2354-9640"},"institutions":[{"id":"https://openalex.org/I1335578998","display_name":"Florida Institute for Human and Machine Cognition","ror":"https://ror.org/02napvw46","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I1335578998"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Marco Carvalho","raw_affiliation_strings":["IHMC, Pensacola, FL, USA","IHMC, Pensacola, FL, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"IHMC, Pensacola, FL, USA","institution_ids":["https://openalex.org/I1335578998"]},{"raw_affiliation_string":"IHMC, Pensacola, FL, USA#TAB#","institution_ids":["https://openalex.org/I1335578998"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039496722","display_name":"Richard Ford","orcid":null},"institutions":[{"id":"https://openalex.org/I106959904","display_name":"Florida Institute of Technology","ror":"https://ror.org/04atsbb87","country_code":"US","type":"education","lineage":["https://openalex.org/I106959904"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Richard Ford","raw_affiliation_strings":["Florida Tech., Melbourne, FL, USA","Florida Tech., Melbourne, FL, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Florida Tech., Melbourne, FL, USA","institution_ids":["https://openalex.org/I106959904"]},{"raw_affiliation_string":"Florida Tech., Melbourne, FL, USA#TAB#","institution_ids":["https://openalex.org/I106959904"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014826623","display_name":"Liam M. Mayron","orcid":null},"institutions":[{"id":"https://openalex.org/I106959904","display_name":"Florida Institute of Technology","ror":"https://ror.org/04atsbb87","country_code":"US","type":"education","lineage":["https://openalex.org/I106959904"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Liam M. Mayron","raw_affiliation_strings":["Florida Tech., Melbourne, FL, USA","Florida Tech., Melbourne, FL, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Florida Tech., Melbourne, FL, USA","institution_ids":["https://openalex.org/I106959904"]},{"raw_affiliation_string":"Florida Tech., Melbourne, FL, USA#TAB#","institution_ids":["https://openalex.org/I106959904"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5053448222"],"corresponding_institution_ids":["https://openalex.org/I84218800"],"apc_list":null,"apc_paid":null,"fwci":4.2009,"has_fulltext":false,"cited_by_count":44,"citation_normalized_percentile":{"value":0.94341639,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"95","last_page":"104"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9764000177383423,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9764000177383423,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9726999998092651,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9544000029563904,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/terminology","display_name":"Terminology","score":0.8231073021888733},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.8067398071289062},{"id":"https://openalex.org/keywords/survivability","display_name":"Survivability","score":0.7127978801727295},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6622145175933838},{"id":"https://openalex.org/keywords/confusion","display_name":"Confusion","score":0.6183938384056091},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5763962268829346},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5545679926872253},{"id":"https://openalex.org/keywords/meaning","display_name":"Meaning (existential)","score":0.5151470899581909},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.48254483938217163},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.4454284906387329},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4438716173171997},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.43475469946861267},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.39405909180641174},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3460540771484375},{"id":"https://openalex.org/keywords/epistemology","display_name":"Epistemology","score":0.18426525592803955},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.17840489745140076},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.12820586562156677},{"id":"https://openalex.org/keywords/linguistics","display_name":"Linguistics","score":0.08663433790206909}],"concepts":[{"id":"https://openalex.org/C547195049","wikidata":"https://www.wikidata.org/wiki/Q1725664","display_name":"Terminology","level":2,"score":0.8231073021888733},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.8067398071289062},{"id":"https://openalex.org/C2781133158","wikidata":"https://www.wikidata.org/wiki/Q1088669","display_name":"Survivability","level":2,"score":0.7127978801727295},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6622145175933838},{"id":"https://openalex.org/C2781140086","wikidata":"https://www.wikidata.org/wiki/Q557945","display_name":"Confusion","level":2,"score":0.6183938384056091},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5763962268829346},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5545679926872253},{"id":"https://openalex.org/C2780876879","wikidata":"https://www.wikidata.org/wiki/Q3054749","display_name":"Meaning (existential)","level":2,"score":0.5151470899581909},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.48254483938217163},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.4454284906387329},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4438716173171997},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.43475469946861267},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.39405909180641174},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3460540771484375},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.18426525592803955},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.17840489745140076},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.12820586562156677},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.08663433790206909},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C11171543","wikidata":"https://www.wikidata.org/wiki/Q41630","display_name":"Psychoanalysis","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2073276.2073286","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2073276.2073286","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 New Security Paradigms Workshop","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306084","display_name":"U.S. Department of Energy","ror":"https://ror.org/01bj3aw27"},{"id":"https://openalex.org/F4320306110","display_name":"U.S. Department of Homeland Security","ror":"https://ror.org/00jyr0d86"},{"id":"https://openalex.org/F4320333450","display_name":"National Energy Technology Laboratory","ror":"https://ror.org/01x26mz03"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W56793145","https://openalex.org/W140379870","https://openalex.org/W1480210583","https://openalex.org/W1520405326","https://openalex.org/W1602659612","https://openalex.org/W1898415326","https://openalex.org/W1920595778","https://openalex.org/W1945100066","https://openalex.org/W1968054699","https://openalex.org/W1974898167","https://openalex.org/W1995875735","https://openalex.org/W2031533839","https://openalex.org/W2041404167","https://openalex.org/W2041905826","https://openalex.org/W2068266569","https://openalex.org/W2084793872","https://openalex.org/W2095767682","https://openalex.org/W2099193292","https://openalex.org/W2109629807","https://openalex.org/W2126554879","https://openalex.org/W2127546815","https://openalex.org/W2131640330","https://openalex.org/W2138729760","https://openalex.org/W2147625551","https://openalex.org/W2168467282","https://openalex.org/W2170265426","https://openalex.org/W2331021632","https://openalex.org/W2345597374","https://openalex.org/W2993383518","https://openalex.org/W4297847885","https://openalex.org/W6640088694","https://openalex.org/W6704557907","https://openalex.org/W7004887530"],"related_works":["https://openalex.org/W2140998642","https://openalex.org/W2064443904","https://openalex.org/W1761928473","https://openalex.org/W2066272013","https://openalex.org/W2488601579","https://openalex.org/W2991148700","https://openalex.org/W2391901998","https://openalex.org/W4403841709","https://openalex.org/W4241003180","https://openalex.org/W1573839549"],"abstract_inverted_index":{"In":[0,62],"applied":[1,16],"sciences":[2],"there":[3,37],"is":[4,12],"a":[5,92,114,118,139],"tendency":[6],"to":[7,102,125,129,138,158],"rely":[8],"on":[9,113],"terminology":[10],"that":[11,77,106],"either":[13],"ill-defined":[14],"or":[15],"inconsistently":[17],"across":[18],"areas":[19,81],"of":[20,41,53,86,95,108,117],"research":[21,78,111],"and":[22,34,51,55,59,161],"application":[23],"domains.":[24],"Examples":[25],"in":[26,49,79,150],"information":[27,136],"assurance":[28],"include":[29],"the":[30,84,87,100,109,126,143],"terms":[31],"resilience,":[32],"robustness":[33],"survivability,":[35],"where":[36],"exists":[38],"subtle":[39],"shades":[40],"meaning":[42],"between":[43],"researchers.":[44],"These":[45],"nuances":[46],"can":[47,153],"result":[48],"confusion":[50],"misinterpretations":[52],"goals":[54],"results,":[56],"hampering":[57],"communication":[58],"complicating":[60],"collaboration.":[61],"this":[63,73],"paper,":[64],"we":[65,75,97,147],"propose":[66],"security-related":[67],"definitions":[68],"for":[69],"these":[70,80],"terms.":[71],"Using":[72],"terminology,":[74],"argue":[76],"must":[82],"consider":[83],"functionality":[85],"system":[88,101,119],"holistically,":[89],"beginning":[90],"with":[91,142,156],"careful":[93],"examination":[94],"what":[96],"actually":[98],"want":[99],"do.":[103],"We":[104],"note":[105],"much":[107],"published":[110],"focuses":[112],"single":[115],"aspect":[116],"--":[120,122],"availability":[121,160],"as":[123],"opposed":[124],"system's":[127],"ability":[128],"complete":[130],"its":[131],"function":[132],"without":[133],"disclosing":[134],"confidential":[135],"or,":[137],"lesser":[140],"extent,":[141],"correct":[144],"output.":[145],"Finally,":[146],"discuss":[148],"ways":[149],"which":[151],"researchers":[152],"explore":[154],"resilience":[155],"respect":[157],"integrity,":[159],"confidentiality.":[162]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":2},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":7},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
