{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T14:18:47Z","timestamp":1761488327030,"version":"3.37.0"},"reference-count":30,"publisher":"Elsevier BV","issue":"7","license":[{"start":{"date-parts":[[2010,7,1]],"date-time":"2010-07-01T00:00:00Z","timestamp":1277942400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"vor","delay-in-days":1461,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Science of Computer Programming"],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1016\/j.scico.2009.10.002","type":"journal-article","created":{"date-parts":[[2009,10,13]],"date-time":"2009-10-13T09:03:33Z","timestamp":1255424613000},"page":"516-542","source":"Crossref","is-referenced-by-count":3,"title":["Aspects of availability"],"prefix":"10.1016","volume":"75","author":[{"given":"Pascal","family":"Fradet","sequence":"first","affiliation":[]},{"given":"St\u00e9phane","family":"Hong Tuan Ha","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.scico.2009.10.002_b1","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/0304-3975(94)90010-8","article-title":"A theory of timed automata","volume":"126","author":"Alur","year":"1994","journal-title":"Theoret. Comput. Sci."},{"issue":"1\u20132","key":"10.1016\/j.scico.2009.10.002_b2","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1007\/s100090050010","article-title":"UPPAAL in a nutshell","volume":"1","author":"Larsen","year":"1997","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"10.1016\/j.scico.2009.10.002_b3","series-title":"Lectures on Concurrency and Petri Nets","first-page":"87","article-title":"Timed automata: Semantics, algorithms and tools","volume":"vol. 3098","author":"Bengtsson","year":"2003"},{"key":"10.1016\/j.scico.2009.10.002_b4","series-title":"Proc. of the sixth international conference on Generative Programming and Component Engineering, GPCE\u201907","first-page":"165","article-title":"Aspects of availability","author":"Fradet","year":"2007"},{"key":"10.1016\/j.scico.2009.10.002_b5","doi-asserted-by":"crossref","unstructured":"P. Fradet, S. Hong Tuan Ha, Syst\u00e8mes de gestion de ressources et aspects de disponibilit\u00e9, in: 2e Journ\u00e9e sur le D\u00e9veloppement de Logiciels Par Aspects, JFDLPA 2005, 2005","DOI":"10.3166\/objet.12.2-3.183-210"},{"issue":"2\u20133","key":"10.1016\/j.scico.2009.10.002_b6","first-page":"183","article-title":"Syst\u00e8mes de gestion de ressources et aspects de disponibilit\u00e9","volume":"12","author":"Fradet","year":"2006","journal-title":"L\u2019Objet - Logiciel, Bases de Donn\u00e9es, R\u00e9seaux"},{"key":"10.1016\/j.scico.2009.10.002_b7","unstructured":"S. Hong Tuan Ha, Programmation par aspects et tissage de propri\u00e9t\u00e9s. Application \u00e0 l\u2019ordonnancement et \u00e0 la disponibilit\u00e9., Ph.D. Thesis, Rennes University, Jan. 2007"},{"key":"10.1016\/j.scico.2009.10.002_b8","series-title":"Dependability: Basic Concepts and Terminology, Dependable Computing and Fault-Tolerant Systems","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-7091-9170-5","author":"Laprie","year":"1992"},{"issue":"2","key":"10.1016\/j.scico.2009.10.002_b9","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/0951-8320(94)90065-5","article-title":"Critical system properties: Survey and taxonomy","volume":"43","author":"Rushby","year":"1994","journal-title":"Reliab. Eng. Syst. Saf."},{"issue":"6","key":"10.1016\/j.scico.2009.10.002_b10","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1109\/32.55087","article-title":"A specification and verification method for preventing denial of service","volume":"16","author":"Yu","year":"1990","journal-title":"IEEE Trans. Soft. Eng."},{"key":"10.1016\/j.scico.2009.10.002_b11","series-title":"11th International Conference on Computer Aided Verification","first-page":"8","article-title":"Timed automata","volume":"vol. 1633","author":"Alur","year":"1999"},{"key":"10.1016\/j.scico.2009.10.002_b12","series-title":"ACISP \u201997: Proceedings of the Second Australasian Conference on Information Security and Privacy","first-page":"90","article-title":"A method to implement a denial of service protection base","author":"Leiwo","year":"1997"},{"issue":"1","key":"10.1016\/j.scico.2009.10.002_b13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/353323.353382","article-title":"Enforceable security policies","volume":"3","author":"Schneider","year":"2000","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"10.1016\/j.scico.2009.10.002_b14","series-title":"Proc. of Conference on Generative Programming and Component Engineering (GPCE\u201902)","first-page":"173","article-title":"A framework for the detection and resolution of aspect interactions","volume":"vol. 2487","author":"Douence","year":"2002"},{"key":"10.1016\/j.scico.2009.10.002_b15","series-title":"Aspect-Oriented Software Development","first-page":"201","article-title":"Trace-based aspects","author":"Douence","year":"2004"},{"key":"10.1016\/j.scico.2009.10.002_b16","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/3-540-45337-7_18","article-title":"An overview of AspectJ","volume":"2072","author":"Kiczales","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"issue":"2","key":"10.1016\/j.scico.2009.10.002_b17","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/BF00571421","article-title":"Calculating the maximum, execution time of real-time programs","volume":"1","author":"Puschner","year":"1989","journal-title":"Real-Time Syst."},{"issue":"1","key":"10.1016\/j.scico.2009.10.002_b18","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1023\/B:TIME.0000048933.15922.f9","article-title":"Modeling control speculation for timing analysis","volume":"29","author":"Li","year":"2005","journal-title":"Real-Time Syst."},{"key":"10.1016\/j.scico.2009.10.002_b19","series-title":"Prog. Lang. and Syst.: Second Asian Symposium, (APLAS\u201904)","first-page":"21","article-title":"Network fusion","volume":"vol. 3302","author":"Fradet","year":"2004"},{"key":"10.1016\/j.scico.2009.10.002_b20","doi-asserted-by":"crossref","unstructured":"T. Colcombet, P. Fradet, Enforcing trace properties by program transformation, in: Symposium on Principles of Programming Languages, POPL\u201900, 2000, pp. 54\u201366","DOI":"10.1145\/325694.325703"},{"key":"10.1016\/j.scico.2009.10.002_b21","doi-asserted-by":"crossref","unstructured":"D.V. Horn, H.G. Mairson, Relating complexity and precision in control flow analysis, in: ICFP \u201907: Proceedings of the 12th ACM SIGPLAN international conference on Functional programming, 2007, pp. 85\u201396","DOI":"10.1145\/1291151.1291166"},{"key":"10.1016\/j.scico.2009.10.002_b22","doi-asserted-by":"crossref","unstructured":"S. Som\u00e9, R. Dssouli, J. Vaucher, From scenarios to timed automata: Building specifications from users requirements, in: Asia Pacific Software Engineering Conference, 1995, pp. 48\u201357","DOI":"10.1109\/APSEC.1995.496953"},{"key":"10.1016\/j.scico.2009.10.002_b23","doi-asserted-by":"crossref","unstructured":"B. Regnell, K. Kimbler, A. Wesslen, Improving the use case driven approach to requirements engineering, in: IEEE International Conference on Requirements Engineering, 1995, pp. 40\u201348","DOI":"10.1109\/ISRE.1995.512544"},{"issue":"2\u20133","key":"10.1016\/j.scico.2009.10.002_b24","doi-asserted-by":"crossref","first-page":"89","DOI":"10.3233\/JCS-1993-22-303","article-title":"A resource allocation model for denial of service protection","volume":"2","author":"Millen","year":"1993","journal-title":"J. Comput. Secur."},{"key":"10.1016\/j.scico.2009.10.002_b25","unstructured":"F. Cuppens, C. Saurel, Towards a formalization of availability and denial of service, in: Inf. Syst. Tech. Panel Symp. on Protecting Nato Information Systems in the 21st Century, 1999"},{"key":"10.1016\/j.scico.2009.10.002_b26","series-title":"OOPSLA \u201901: Proceedings of the 16th ACM SIGPLAN Conference on Object Oriented Programming, Systems, Languages, and Applications","first-page":"139","article-title":"Portable resource control in Java","author":"Binder","year":"2001"},{"key":"10.1016\/j.scico.2009.10.002_b27","doi-asserted-by":"crossref","unstructured":"V.\u00a0K. Nandivada, J. Palsberg, Timing analysis of TCP servers for surviving denial-of-service attacks, in: IEEE Real-Time and Embedded Technology and Applications Symp., 2005, pp. 541\u2013549","DOI":"10.1109\/RTAS.2005.54"},{"issue":"1\u20132","key":"10.1016\/j.scico.2009.10.002_b28","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/s10207-004-0046-8","article-title":"Edit automata: enforcement mechanisms for run-time security policies","volume":"4","author":"Ligatti","year":"2005","journal-title":"Int. J. Inf. Secur."},{"key":"10.1016\/j.scico.2009.10.002_b29","unstructured":"H. Sipma, A formal model for cross-cutting modular transition systems, in: Workshop on Foundations of Aspect-Oriented Languages, FOAL\u201903, 2003"},{"issue":"3","key":"10.1016\/j.scico.2009.10.002_b30","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1016\/j.scico.2005.12.001","article-title":"Aspect-oriented programming for reactive systems: Larissa, a proposal in the synchronous framework","volume":"63","author":"Altisen","year":"2006","journal-title":"Sci. Comput. Programming"}],"container-title":["Science of Computer Programming"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167642309001312?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167642309001312?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T18:41:20Z","timestamp":1739385680000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167642309001312"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":30,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2010,7]]}},"alternative-id":["S0167642309001312"],"URL":"https:\/\/doi.org\/10.1016\/j.scico.2009.10.002","relation":{},"ISSN":["0167-6423"],"issn-type":[{"type":"print","value":"0167-6423"}],"subject":[],"published":{"date-parts":[[2010,7]]}}}