{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:39:03Z","timestamp":1725500343372},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540775348"},{"type":"electronic","value":"9783540775355"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77535-5_10","type":"book-chapter","created":{"date-parts":[[2008,1,8]],"date-time":"2008-01-08T10:23:47Z","timestamp":1199787827000},"page":"128-141","source":"Crossref","is-referenced-by-count":0,"title":["Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine"],"prefix":"10.1007","author":[{"given":"Yoshiki","family":"Sameshima","sequence":"first","affiliation":[]},{"given":"Hideaki","family":"Saisho","sequence":"additional","affiliation":[]},{"given":"Tsutomu","family":"Matsumoto","sequence":"additional","affiliation":[]},{"given":"Norihisa","family":"Komoda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Gordon, L.A., Loeb, M.P., Lucyshyn, W., Richardson, R.: 2006 CSI\/FBI Computer Crime and Security Survey: Computer Security Institute (2006)"},{"key":"10_CR2","unstructured":"Symantec Reports Rise in Data Theft, Data Leakage, and Targeted Attacks Leading to Hackers\u2019 Financial Gain: News Release (19th March 2007), \n                    \n                      http:\/\/www.symantec.com\/about\/news\/release\/article.jsp?prid=20070319_01"},{"key":"10_CR3","unstructured":"McAfee, Inc. Releases New Research Suggesting Data Loss Will Lead To Next Major Corporate Collapse: Press Release (24th April 2007), \n                    \n                      http:\/\/www.symantec.com\/about\/news\/release\/article.jsp?prid=20070319_01"},{"key":"10_CR4","unstructured":"Frantzen, S.: Targeted attack: Experience from the trenches: The SANS Institute (May 21, 2006) \n                    \n                      http:\/\/isc.sans.org\/diary.html?storyid=1345"},{"key":"10_CR5","unstructured":"Argus Systems Group, Inc.: PitBull.comPack, OS-level Security for Solaris and AIX: White Paper (March 2001), \n                    \n                      http:\/\/www.argus-systems.com\/public\/docs\/pitbull.whitepaper.oss.pdf"},{"key":"10_CR6","unstructured":"Loscocco, P.A., Smalley, S.D.: Meeting Critical Security Objectives with Security-Enhanced Linux. In: Proceedings of the 2001 Ottawa Linux Symposium (2001), \n                    \n                      http:\/\/www.nsa.gov\/selinux\/papers\/ottawa01.pdf"},{"key":"10_CR7","unstructured":"Trusted Computer System Evaluation Criteria; Department of Defense Standard 5200.28-STD (August 1983)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., Seshia, S., Song, D., Bryant, R.E.: Semantics-Aware Malware Detection. In: IEEE Symposium on Security and Privacy (2005)","DOI":"10.1109\/SP.2005.20"},{"key":"10_CR9","unstructured":"HP NetTop: A Technical Overview (December 2004)"},{"key":"10_CR10","unstructured":"Meushaw, R., Simard, D.: Nettop, Commercial Technology in High Assurance Applications: NSA Tech Trend Notes (Fall 2000), \n                    \n                      http:\/\/www.vmware.com\/pdf\/TechTrendNotes.pdf"},{"key":"10_CR11","unstructured":"Crystal Dew World, \n                    \n                      http:\/\/crystalmark.info\/?lang=en"},{"key":"10_CR12","unstructured":"Trusted Computing Group, TCG Specification Architecture Overview, Specification Revision 1.4 (August 2, 2007)"},{"key":"10_CR13","unstructured":"Griffin, J.L., Jaeger, T., Perez, R., Sailer, R., van Doorn, L., Caceres, R.: Trusted Virtual Domains: Toward Secure Distributed Services. In: The First Workshop on Hot Topics in System Dependability (June 30, 2005)"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Inoue, H., Ikeno, A., Kondo, M., Sakai, J., Edahiro, M.: VIRTUS: A new processor virtualization architecture for security-oriented next-generation mobile terminals. In: Proceedings of the 43rd annual conference on Design automation, pp. 484\u2013489 (2006)","DOI":"10.1145\/1146909.1147038"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77535-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T10:55:52Z","timestamp":1551351352000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77535-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540775348","9783540775355"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77535-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}