{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:17:33Z","timestamp":1725887853538},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319504988"},{"type":"electronic","value":"9783319505008"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-50500-8_8","type":"book-chapter","created":{"date-parts":[[2017,5,18]],"date-time":"2017-05-18T07:14:46Z","timestamp":1495091686000},"page":"193-216","source":"Crossref","is-referenced-by-count":4,"title":["Common Criteria: Origins and Overview"],"prefix":"10.1007","author":[{"given":"John","family":"Tierney","sequence":"first","affiliation":[]},{"given":"Tony","family":"Boswell","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,19]]},"reference":[{"key":"8_CR1","unstructured":"Common Criteria for Information Technology Security Evaluation - Part 1: Introduction and general model, Version 3.1 Revision 4, September 2012, CCMB-2012-09-001 (available from the \u2018Publications\u2019 section at \nwww.commoncriteriaportal.org\n\n)"},{"key":"8_CR2","unstructured":"Common Criteria for Information Technology Security Evaluation - Part 2: Security functional components, Version 3.1 Revision 4, September 2012, CCMB-2012-09-002 (available from the \u2018Publications\u2019 section at \nwww.commoncriteriaportal.org\n\n)"},{"key":"8_CR3","unstructured":"Common Criteria for Information Technology Security Evaluation - Part 3 Security assurance components, Version 3.1 Revision 4, September 2012, CCMB-2012-09-003 (available from the \u2018Publications\u2019 section at \nwww.commoncriteriaportal.org\n\n)"},{"key":"8_CR4","unstructured":"Common Methodology for Information Technology Security Evaluation - Evaluation methodology, Version 3.1 Revision 4, September 2012, CCMB-2012-09-004 (available from the \u2018Publications\u2019 section at \nwww.commoncriteriaportal.org\n\n)"},{"key":"8_CR5","unstructured":"Arrangement on the Recognition of Common Criteria Certificates In the field of Information Technology Security, 2 July 2014 (available from the \u2018About the CC\u2019 section at \nwww.commoncriteriaportal.org\n\n)"},{"key":"8_CR6","unstructured":"Application of Attack Potential to Smartcards, v2.9, May 2013, CCDB-2013-05-002 (available from the \u2018Publications\u2019 section at \nwww.commoncriteriaportal.org\n\n)"},{"key":"8_CR7","unstructured":"Security IC Platform Protection Profile, version 1.0, 15 June 2007, BSI-PP-0035 (available from the \u2018Protection Profiles\u2019 section at \nwww.commoncriteriaportal.org\n\n)"},{"key":"8_CR8","unstructured":"Composite Product Evaluation for Smart Cards and Similar Devices, v1.2, April 2012, CCDB-2012-04-001 (available from the \u2018Publications\u2019 section at \nwww.commoncriteriaportal.org\n\n)"}],"container-title":["Smart Cards, Tokens, Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50500-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,18]],"date-time":"2017-05-18T07:18:28Z","timestamp":1495091908000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-50500-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319504988","9783319505008"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50500-8_8","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}