{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T22:32:02Z","timestamp":1725834722152},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319265018"},{"type":"electronic","value":"9783319265025"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26502-5_15","type":"book-chapter","created":{"date-parts":[[2015,10,19]],"date-time":"2015-10-19T03:15:52Z","timestamp":1445224552000},"page":"205-212","source":"Crossref","is-referenced-by-count":1,"title":["Guaranteeing Dependency Enforcement in Software Updates"],"prefix":"10.1007","author":[{"given":"Luigi","family":"Catuogno","sequence":"first","affiliation":[]},{"given":"Clemente","family":"Galdi","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Persiano","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Ambrosin, M., Busold, C., Conti, M., Sadeghi, A.-R., Schunter, M.: Updaticator: updating billions of devices by an efficient, scalable and secure software update distribution over untrusted cache-enabled networks. In: ESORICS (2014), pp. 76\u201393 (2014)","DOI":"10.1007\/978-3-319-11203-9_5"},{"key":"15_CR2","unstructured":"Bellissimo, A., Burgess, J., Fu, K.: Secure software updates: disappointments and new challenges. In: HotSec (2006)"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/978-3-642-39884-1_33","volume-title":"Financial Cryptography and Data Security","author":"J Cappos","year":"2013","unstructured":"Cappos, J.: Avoiding theoretical optimality to efficiently and privately retrieve security updates. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 386\u2013394. Springer, Heidelberg (2013)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Cappos, J., Samuel, J., Baker, S., Hartman, J.H.: A look in the mirror: attacks on package managers. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 565\u2013574. ACM (2008)","DOI":"10.1145\/1455770.1455841"},{"issue":"3","key":"15_CR5","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.istr.2012.10.003","volume":"17","author":"L Catuogno","year":"2013","unstructured":"Catuogno, L., Gassir\u00e0, R., Masullo, M., Visconti, I.: Smartk: Smart cards in operating systems at kernel level. Information Security Technical Report 17(3), 93\u2013104 (2013). Security and Privacy for Digital Ecosystems","journal-title":"Information Security Technical Report"},{"issue":"5","key":"15_CR6","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1016\/j.dam.2008.04.001","volume":"157","author":"G Crescenzo Di","year":"2009","unstructured":"Di Crescenzo, G., Galdi, C.: Hypergraph decomposition and secret sharing. Discrete Applied Mathematics 157(5), 928\u2013946 (2009)","journal-title":"Discrete Applied Mathematics"},{"issue":"2","key":"15_CR7","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"15_CR8","unstructured":"Dolstra, E., De Jonge, M., Visser, E.: Nix: a safe and policy-free system for software deployment. In: LISA, vol. 4, pp. 79\u201392 (2004)"},{"key":"15_CR9","unstructured":"Dumitra\u015f, T., Kavulya, S., Narasimhan, P.: A fault model for upgrades in distributed systems (cmu-pdl-08-115). CMU-PDL-08-115 (2008)"},{"key":"15_CR10","unstructured":"GlobalPlatform. TEE system architecture v1.0. \n                    http:\/\/globalplatform.org"},{"key":"15_CR11","unstructured":"Hart, J., D\u2019Amelia, J.: An analysis of RPM validation drift. In: LISA, vol. 2, pp. 155\u2013166 (2002)"},{"issue":"9","key":"15_CR12","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1002\/ecjc.4430720906","volume":"72","author":"M Ito","year":"1989","unstructured":"Ito, M., Saito, A., Nishizeki, T.: Secret sharing scheme realizing general access structure. Electronics and Communications in Japan (Part III: Fundamental Electronic Science 72(9), 56\u201364 (1989)","journal-title":"Electronics and Communications in Japan (Part III: Fundamental Electronic Science"},{"key":"15_CR13","unstructured":"Neuhaus, S., Zimmermann, T.: The beauty and the beast: vulnerabilities in red Hat\u2019s packages. In: USENIX Annual Technical Conference (2009)"},{"key":"15_CR14","unstructured":"Rubin, A.D.: Trusted distribution of software over the internet. In: 1995 Symposium on Network and Distributed System Security, (S)NDSS 1995, San Diego, California, February 16\u201317, 1995, pp. 47\u201353 (1995)"},{"issue":"1","key":"15_CR15","first-page":"7","volume":"34","author":"J Samuel","year":"2009","unstructured":"Samuel, J., Cappos, J.: Package managers still vulnerable: How to protect your systems. login: Usenix Magazine 34(1), 7\u201315 (2009)","journal-title":"login: Usenix Magazine"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Samuel, J., Mathewson, N., Cappos, J., Dingledine, R.: Survivable key compromise in software update systems. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 61\u201372. ACM (2010)","DOI":"10.1145\/1866307.1866315"},{"issue":"11","key":"15_CR17","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Secure IT Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26502-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T07:09:44Z","timestamp":1559286584000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26502-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319265018","9783319265025"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26502-5_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}