{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:34:32Z","timestamp":1725888872150},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319594149"},{"type":"electronic","value":"9783319594156"}],"license":[{"start":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T00:00:00Z","timestamp":1496188800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-59415-6_27","type":"book-chapter","created":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T04:42:30Z","timestamp":1496119350000},"page":"277-286","source":"Crossref","is-referenced-by-count":2,"title":["Process of Mobile Application Development from the Security Perspective"],"prefix":"10.1007","author":[{"given":"Aneta","family":"Majchrzycka","sequence":"first","affiliation":[]},{"given":"Aneta","family":"Poniszewska-Maranda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Porter Felt, A., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 3\u201314 (2011)","key":"27_CR1","DOI":"10.1145\/2046614.2046618"},{"doi-asserted-by":"crossref","unstructured":"Souppaya, M.P., Scarfone, K.A.: Guidelines for Managing the Security of Mobile Devices in the Enterprise. NIST (2013)","key":"27_CR2","DOI":"10.6028\/NIST.SP.800-124r1"},{"unstructured":"Apple, iOS Security (2014). images.apple.com\/ipad\/business\/docs\/iOS\\_Security\\_Feb14.pdf","key":"27_CR3"},{"doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution, In: Proceedings of the 33rd IEEE Symposium on Security and Privacy (2012)","key":"27_CR4","DOI":"10.1109\/SP.2012.16"},{"unstructured":"Benedict, C.: Under the Hood: Reversing Android Applications. Infosec Institute (2012)","key":"27_CR5"},{"unstructured":"Enck, W., Octeau, D., McDaniel P., Chaudhuri S.: A study of android application security. In: Proceedings of the 20th USENIX Security Symposium (2011)","key":"27_CR6"},{"issue":"1","key":"27_CR7","first-page":"14","volume":"18","author":"WM Fitzgerald","year":"2013","unstructured":"Fitzgerald, W.M., Neville, U., Foley, S.N.: MASON: mobile autonomic security for network access controls. Inf. Secur. Appl. 18(1), 14\u201329 (2013)","journal-title":"Inf. Secur. Appl."},{"doi-asserted-by":"crossref","unstructured":"Alhamed, M., Amir, K., Omari, M., Le, W.: Comparing Privacy Control Methods for Smartphone Platforms, Engineering of Mobile-Enabled Systems (2013)","key":"27_CR8","DOI":"10.1109\/MOBS.2013.6614221"},{"issue":"2","key":"27_CR9","first-page":"123","volume":"4","author":"A Michalska","year":"2015","unstructured":"Michalska, A., Poniszewska-Maranda, A.: Security risks and their prevention capabilities in mobile application development. Inf. Syst. Manag. 4(2), 123\u2013134 (2015). WULS Press","journal-title":"Inf. Syst. Manag."},{"issue":"3","key":"27_CR10","first-page":"495","volume":"64","author":"A Michalska","year":"2016","unstructured":"Michalska, A., Poniszewska-Maranda, A.: Secure development model for mobile applications. Bull. Pol. Acad. Sci. Tech. Sci. 64(3), 495\u2013503 (2016)","journal-title":"Bull. Pol. Acad. Sci. Tech. Sci."},{"doi-asserted-by":"crossref","unstructured":"Poniszewska-Maranda, A., Majchrzycka, A.: Access control approach in development of mobile applications. In: Younas, M. et al. (eds.) Mobile Web and Intelligent Information Systems. LNCS, vol. 9847, pp. 149\u2013162 (2016)","key":"27_CR11","DOI":"10.1007\/978-3-319-44215-0_12"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Dependability Engineering of Complex Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59415-6_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T03:10:34Z","timestamp":1569381034000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59415-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,31]]},"ISBN":["9783319594149","9783319594156"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59415-6_27","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,5,31]]}}}