{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:48:38Z","timestamp":1726037318933},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030249069"},{"type":"electronic","value":"9783030249076"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_15","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T19:02:46Z","timestamp":1562785366000},"page":"183-195","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Data Protection Labware for Mobile Security"],"prefix":"10.1007","author":[{"given":"Hossain","family":"Shahriar","sequence":"first","affiliation":[]},{"given":"Md Arabin","family":"Talukder","sequence":"additional","affiliation":[]},{"given":"Hongmei","family":"Chi","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Sheikh","family":"Ahamed","sequence":"additional","affiliation":[]},{"given":"Atef","family":"Shalan","sequence":"additional","affiliation":[]},{"given":"Khaled","family":"Tarmissi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"15_CR1","unstructured":"Secure Mobile Software Development. \n                    https:\/\/sites.google.com\/site\/smsdproject\/home"},{"key":"15_CR2","unstructured":"Xie, J., Lipford, H.R., Chu, B.: Why do programmers make security errors? In: Proceedings of IEEE Symposium on Visual Languages and Human Centric Computing, pp. 161\u2013164 (2011)"},{"key":"15_CR3","unstructured":"Introduction to Database Security Issues Types of Security Database. \n                    http:\/\/www.academia.edu\/6866589\/Introduction_to_Database_Security_Issues_Types_of_Security_Database"},{"key":"15_CR4","unstructured":"Davis, N.: Secure software development life cycle processes. Software Engineering Institute (2013)"},{"issue":"6","key":"15_CR5","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/MWC.2017.1800097","volume":"25","author":"J Feng","year":"2018","unstructured":"Feng, J., Yang, L.T., Liu, X., Zhan, R.: Privacy-preserving tensor analysis and processing models for wireless Internet of Things. IEEE Wirel. Commun. 25(6), 98\u2013103 (2018)","journal-title":"IEEE Wirel. Commun."},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Whitney, M., Lipford, H., Chu, B., Zhu, J.: Embedding secure coding instruction into the IDE: a field study in an advanced CS course. In: Proceedings of the 46th ACM Technical Symposium on Computer Science Education (SIGCSE), pp. 60\u201365 (2015)","DOI":"10.1145\/2676723.2677280"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1177\/0735633117708816","volume":"56","author":"M Whitney","year":"2017","unstructured":"Whitney, M., Lipford, H., Chu, B., Thomas, T.: Embedding secure coding instruction into the ide: complementing early and intermediate CS courses with ESIDE. J. Educ. Comput. Res. 56, 415\u2013438 (2017)","journal-title":"J. Educ. Comput. Res."},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Zhu, J., Lipford, H., Chu, B.: Interactive support for secure programming education. In: Proceedings of the 44th Technical Symposium on Computer Science Education, pp. 687\u2013692, March 2013","DOI":"10.1145\/2445196.2445396"},{"key":"15_CR9","unstructured":"Yuan, X., et al.: Teaching mobile computing and mobile security. In: Proceedings of IEEE Frontiers in Education (FIE), pp. 1\u20136 (2016)"},{"key":"15_CR10","unstructured":"Computer Science Curricula, Association for Computing (2013). \n                    https:\/\/www.acm.org\/education\/CS2013-final-report.pdf"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Goseva-Popstojanovaa, K., Perhinschib, A.: On the capability of static code analysis to detect security vulnerabilities. \n                    www.community.wvu.edu\/~kagoseva\/Papers\/IST-2015.pdf","DOI":"10.1016\/j.infsof.2015.08.002"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.infsof.2017.04.001","volume":"88","author":"L Li","year":"2017","unstructured":"Li, L., et al.: Static analysis of Android apps: a systematic literature review. Inf. Softw. Technol. 88, 67\u201395 (2017)","journal-title":"Inf. Softw. Technol."},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Chi, H.: Teaching secure coding practices to STEM students. In: Proceedings of the 2013 Information Security Curriculum Development Conference, Kennesaw, GA, p. 42, October 2013","DOI":"10.1145\/2528908.2528911"},{"key":"15_CR14","unstructured":"The FindBugs plugin for security audits of Java web applications. \n                    http:\/\/find-sec-bugs.github.io\n                    \n                  . Accessed 2019"},{"key":"15_CR15","unstructured":"Dwivedi, K., et al.: DidFail: coverage and precision enhancement (2017)"},{"key":"15_CR16","unstructured":"DroidSafe. \n                    https:\/\/mit-pac.github.io\/droidsafe-src\/"},{"key":"15_CR17","unstructured":"What is Cuckoo? \u2014 CuckooDroid v1.0 Book. (n.d.). \n                    https:\/\/cuckoo-droid.readthedocs.io\/en\/latest\/introduction\/what\/"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Arzt, S., et al.: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), pp. 259\u2013269 (2014)","DOI":"10.1145\/2666356.2594299"},{"key":"15_CR19","unstructured":"Babil, G.S., Mehani, O., Boreli, R., Kaafar, M.-A.: On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices. In: Proceedings of 2013 IEEE International Conference on Security and Cryptography (SECRYPT), Reykjavik, Iceland, pp. 1\u20138 (2013)"},{"issue":"2","key":"15_CR20","doi-asserted-by":"publisher","first-page":"104","DOI":"10.4018\/IJISP.2019040107","volume":"13","author":"F Xu","year":"2019","unstructured":"Xu, F., Su, M.: Privacy preservation based on separation sensitive attributes for cloud computing. Int. J. Inf. Secur. Priv. 13(2), 104\u2013119 (2019)","journal-title":"Int. J. Inf. Secur. Priv."},{"key":"15_CR21","doi-asserted-by":"publisher","unstructured":"Feng, J., Yang, L., Zhu, Q., Choo, K.: Privacy-preserving tensor decomposition over encrypted data in a federated cloud environment. IEEE Trans. Dependable Secure Comput. (2018). \n                    https:\/\/doi.org\/10.1109\/tdsc.2018.2881452","DOI":"10.1109\/tdsc.2018.2881452"},{"issue":"2","key":"15_CR22","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/3230641","volume":"19","author":"J Feng","year":"2019","unstructured":"Feng, J., Yang, L., Zhang, R.: Practical privacy-preserving high-order bi-lanczos in integrated edge-fog-cloud architecture for cyber-physical-social systems. ACM Trans. Internet Technol. 19(2), 26 (2019)","journal-title":"ACM Trans. Internet Technol."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T19:05:42Z","timestamp":1562785542000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}