{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:32:51Z","timestamp":1725687171089},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642304354"},{"type":"electronic","value":"9783642304361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30436-1_30","type":"book-chapter","created":{"date-parts":[[2012,6,5]],"date-time":"2012-06-05T16:20:29Z","timestamp":1338913229000},"page":"364-375","source":"Crossref","is-referenced-by-count":2,"title":["Security-by-Contract for the OSGi Platform"],"prefix":"10.1007","author":[{"given":"Olga","family":"Gadyatskaya","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[]},{"given":"Anton","family":"Philippov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","unstructured":"The\u00a0OSGi Alliance. OSGi service platform core specification. Version 4.3 (2011)"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Belimpasakis, P., Michael, M., Moloney, S.: The home as a content provider for mash-ups with external services. In: CCNC 2009, pp. 1\u20135 (2009)","DOI":"10.1109\/CCNC.2009.4784722"},{"issue":"5","key":"30_CR3","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.jlap.2009.02.013","volume":"78","author":"N. Bielova","year":"2009","unstructured":"Bielova, N., Dragoni, N., Massacci, F., Naliuka, K., Siahaan, I.: Matching in security-by-contract for mobile code. Journal of Logic and Algebraic Programming\u00a078(5), 340\u2013358 (2009)","journal-title":"Journal of Logic and Algebraic Programming"},{"key":"30_CR4","unstructured":"Capelastegui, P., Gadyatskaya, O., Massacci, F., Philippov, A.: Security-by-Contract for the OSGi framework. Technical Report DISI-12-002, DISI, University of Trento, Italy, \n                    \n                      http:\/\/www.disi.unitn.it\/~gadyatskaya\/osgi.html"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Dragoni, N., Lostal, E., Gadyatskaya, O., Massacci, F., Paci, F.: A load time Policy Checker for open multi-application smart cards. In: Proc. of POLICY 2011, pp. 153\u2013156 (2011)","DOI":"10.1109\/POLICY.2011.40"},{"key":"30_CR6","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1145\/1653662.1653691","volume-title":"CCS 2009","author":"W. Enck","year":"2009","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: CCS 2009, pp. 235\u2013245. ACM, New York (2009)"},{"key":"30_CR7","unstructured":"Nauman, M., Khan, S.: Design and Implementation of a Fine-grained Resource Usage Model for the Android Platform. In: IJAIT (2010)"},{"key":"30_CR8","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TSC.2010.8","volume":"99","author":"A. Ngu","year":"2010","unstructured":"Ngu, A., Carlson, M., Sheng, Q., Paik, H.: Semantic-based mashup of composite applications. IEEE Tran. on Services Computing\u00a099, 2\u201315 (2010)","journal-title":"IEEE Tran. on Services Computing"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P.: Semantically rich application-centric security in Android. In: Proceedings of ACSAC 2009, pp. 340\u2013349 (2009)","DOI":"10.1109\/ACSAC.2009.39"},{"key":"30_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-78789-1_5","volume-title":"Software Composition","author":"P. Parrend","year":"2008","unstructured":"Parrend, P., Fr\u00e9not, S.: Component-Based Access Control: Secure Software Composition through Static Analysis. In: Pautasso, C., Tanter, \u00c9. (eds.) SC 2008. LNCS, vol.\u00a04954, pp. 68\u201383. Springer, Heidelberg (2008)"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Phung, P., Sands, D.: Security policy enforcement in the OSGi framework using aspect-oriented programming. In: COMPSAC 2008, pp. 1076\u20131082 (2008)","DOI":"10.1109\/COMPSAC.2008.149"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Security and Privacy Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30436-1_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:39:32Z","timestamp":1620128372000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30436-1_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642304354","9783642304361"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30436-1_30","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}