{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:56:55Z","timestamp":1725562615615},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642147050"},{"type":"electronic","value":"9783642147067"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14706-7_26","type":"book-chapter","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T09:14:43Z","timestamp":1281518083000},"page":"329-336","source":"Crossref","is-referenced-by-count":0,"title":["Virtual Environment Security Modeling"],"prefix":"10.1007","author":[{"given":"Dmitry","family":"Zegzhda","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ekaterina","family":"Rudina","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"7","key":"26_CR1","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1145\/361011.361073","volume":"17","author":"G.J. Popek","year":"1974","unstructured":"Popek, G.J., Goldberg, R.P.: Formal Requirements for Virtualizable Third Generation Architectures. Association for Computing Machinery, Inc.\u00a017(7), 412\u2013421 (1974)","journal-title":"Association for Computing Machinery, Inc."},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Adams, K., Agesen, O.: A Comparison of Software and Hardware Techniques for x86 Virtualization. VMware (2006), http:\/\/www.vmware.com\/pdf\/asplos235_adams.pdf","DOI":"10.1145\/1168857.1168860"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Chen, P.M., Noble, B.D.: When Virtual Is Better Than Real. In: 8th Workshop on Hot Topics in Operating Systems, HotOS (2001)","DOI":"10.1109\/HOTOS.2001.990073"},{"key":"26_CR4","unstructured":"Garfinkel, T., Rosenblum, M.: A Virtual Machine Introspection Based Architecture for Intrusion Detection. In: Proc. Network and Distributed Systems Security Symposium (2003)"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Zhenkai, L., Venkatakrishnan, V.N., Sekar, R.: Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. In: Proceedings of Annual Computer Security Applications Conference (2003)","DOI":"10.1109\/CSAC.2003.1254323"},{"key":"26_CR6","unstructured":"Goldberg, I., Wagner, D., Thomas, R., Brewer, E.A.: Secure Environment for Untrusted Helper Applications. In: Proceedings of the 6th Usenix Security Symposium (1996)"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14706-7_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:56:35Z","timestamp":1606186595000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14706-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147050","9783642147067"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14706-7_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}