{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:49:37Z","timestamp":1743101377471,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540562467"},{"type":"electronic","value":"9783540474883"}],"license":[{"start":{"date-parts":[[1992,1,1]],"date-time":"1992-01-01T00:00:00Z","timestamp":694224000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1992]]},"DOI":"10.1007\/bfb0013899","type":"book-chapter","created":{"date-parts":[[2005,11,23]],"date-time":"2005-11-23T07:24:15Z","timestamp":1132730655000},"page":"193-208","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["An Object-Oriented view of fragmented data processing for fault and intrusion tolerance in distributed systems"],"prefix":"10.1007","author":[{"given":"Jean-Charles","family":"Fabre","sequence":"first","affiliation":[]},{"given":"Brian","family":"Randell","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,9]]},"reference":[{"key":"11_CR1","unstructured":"J.C. Laprie, Ed., Dependability: Basic Concepts and Terminology (in English, French, German, Italian and Japanese), series Dependable Computing and Fault-Tolerant Systems, (A. Avizienis, H. Kopetz, J.C. Laprie Eds.), Vol.5, Springer-Verlag, 265p., ISBN 3-211-82296-8 and 0-387-82296-8,1992."},{"key":"11_CR2","unstructured":"J.-M. Fray and J.-C. Fabre, \u201cFragmented Data Processing: an Approach to Secure and Reliable Processing in Distributed Computing Systems\u201d, in Proc. 1st IFIP Int. Working Conf. on Dependable Computing for Critical Applications, Santa Barbara, California (USA), 1989, pp. 131\u2013137."},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Y. Deswarte, L. Blain and J.-C. Fabre, \u201cIntrusion Tolerance in Distributed Computing Systems\u201d, in Proc. IEEE Symp. on Security and Privacy, Oakland California (USA), 1991, pp. 110\u2013121.","DOI":"10.1109\/RISP.1991.130780"},{"key":"11_CR4","unstructured":"G. Trouessin, J.C. Fabre and Y. Deswarte, \u201cReliable Processing of Confidential Information\u201d, Proceedings of the 7th Internaltional Conference on Information Security, IFIP\/Sec'91, Brighton (United Kingdom), 1991, pp. 210\u2013221."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"J.-M. Fray, Y. Deswarte and D. Powell, \u201cIntrusion Tolerance Using Fine-Grain Fragmentation-Scattering\u201d, in Proc. IEEE Symp. on Security and Privacy, Oakland, California (USA), 1986, pp. 194\u2013200.","DOI":"10.1109\/SP.1986.10019"},{"key":"11_CR6","unstructured":"Y. Koga, E. Fukushima and K. Yoshihara. \u201cError recoverable and securable data communication for computer network,\u201d in Proc. 12th IEEE Int. Symp. on Fault-Tolerant Computing (FTCS-12), pp. 183\u2013186, Santa Monica, California (USA), 1982, pp. 183\u2013186."},{"key":"11_CR7","unstructured":"D. Powell, Ed., Delta-4: A Generic Architecture for Dependable Distributed Computing, series Research Reports ESPRIT, Project 818\/2252, Delta-4, Vol. 1 of 1, 484 p., ISBN 3-540-54985-4 and 0-387-54985-4, Springer-Verlag, 1991."},{"key":"11_CR8","first-page":"455","volume-title":"The Security approach in DELTA-4","author":"P.G. Ran\u00e9a","year":"1988","unstructured":"P.G. Ran\u00e9a, Y. Deswarte, J.M. Fray, D. Powell, \u201cThe Security approach in DELTA-4\u201d, in Proc. of the European Telematics Conference (EUTECO-88) on Research into Networks and Distributed Applications, Viena, Austria, pp.455\u2013466 (Ed. North-Holland, April 1988)."},{"key":"11_CR9","first-page":"97","volume-title":"Proc. of the European Symposium in Computer Security (ESORICS 90)","author":"L. Blain","year":"1990","unstructured":"L. Blain and Y. Deswarte, \u201cAn intrusion-tolerant security server for an open distributed system\u201d, in Proc. of the European Symposium in Computer Security (ESORICS 90), AFCET, Toulouse, France, pp. 97\u2013104, 1990, 2-9036778-9."},{"key":"11_CR10","first-page":"295","volume-title":"Proceedings of the 14th National Computer Security Conference","author":"G. Trouessin","year":"1991","unstructured":"G. Trouessin, Y. Deswarte, J.C. Fabre and B. Randell, \u201cImprovement of Data Processing Security by means of Fault Tolerance\u201d, Proceedings of the 14th National Computer Security Conference, NCSC, Washington DC (USA), 1991, pp. 295\u2013304"},{"issue":"#1","key":"11_CR11","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/52.62934","volume":"8","author":"S.K. Shrivastava","year":"1991","unstructured":"S.K. Shrivastava, G.N. Dixon and G.D. Parrington, \u201cAn Overview of the Arjuna Distributed Programming System\u201d, IEEE Software, vol. 8, #1, 1991, pp.66\u201373.","journal-title":"IEEE Software"},{"key":"11_CR12","volume-title":"INRIA Research Report 1404","author":"M. Makpangou","year":"1991","unstructured":"M. Makpangou, Y. Gourhant, J.-P.L. Narzul and M. Shapiro, \u201cStructuring Distributed Applications as Fragmented Objects\u201d, INRIA Research Report 1404, INRIA, Rocquencourt, France, 1991."},{"issue":"#4","key":"11_CR13","first-page":"287","volume":"2","author":"M. Shapiro","year":"1989","unstructured":"M. Shapiro, Y. Gourhant, S. Halbert, L. Mosseri, M. Ruffin and C. Valot, \u201cSOS: An Object-Oriented Operating System \u2014 Assessment and perspective\u201d, Computing Systems, vol. 2, #4, December 1989, pp. 287\u2013338.","journal-title":"Computing Systems"},{"key":"11_CR14","first-page":"82","volume-title":"Proc. of the ICCL","author":"E.H. Bal","year":"1988","unstructured":"E.H. Bal and A.S. Tanenbaum, \u201cDistributed programming with shared data\u201d, in Proc. of the ICCL, Miami, Florida (USA), IEEE, Computer Society Press, 1988, pp. 82\u201391."},{"issue":"#2","key":"11_CR15","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/24686.24694","volume":"22","author":"B. Meyer","year":"1987","unstructured":"B. Meyer, \u201cEiffel: Programming for Reusability and Extendibility\u201d, ACM SIGPLAN, vol. 22, #2, pp.85\u201394, 1987.","journal-title":"ACM SIGPLAN"},{"key":"11_CR16","unstructured":"T. Anderson and P.A. Lee, Fault Tolerance: Principles and Practice, Prentice Hall, 1981."},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"P.D. Ezhilchelvan and S.K. Shrivastava, \u201cA Distributed System Architecture Supporting High Availability and Reliability\u201d, in Preprints, 2nd Int. Working Conference on Dependable Computing for Critical Applications, Tucson, Arizona (USA), 1991, pp. 36\u201348.","DOI":"10.1007\/978-3-7091-9198-9_4"},{"key":"11_CR18","unstructured":"B. Randell and J.C. Fabre, \u201cFDP techniques in Object-Oriented Systems\u201d, LAAS Research Report n\u221891114, Computing Laboratory of the University of Newcastle-upon-Tyne Research Report n\u2218337, 35p., May 1991."},{"key":"11_CR19","unstructured":"T.F. Lunt, \u201cMultilevel Security for Object-Oriented Database Systems\u201d, in Proc. 3rd IFIP Workshop on Database Security, Monterey CA, USA, 1989."},{"issue":"#11","key":"11_CR20","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir, \u201cHow to Share a Secret\u201d, Comm. ACM, vol. 22, #11, pp.612\u2013613, 1979.","journal-title":"Comm. ACM"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0013899","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T21:37:03Z","timestamp":1736113023000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0013899"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992]]},"ISBN":["9783540562467","9783540474883"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/bfb0013899","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1992]]},"assertion":[{"value":"9 June 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}