{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:41:59Z","timestamp":1725900119015},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642366598"},{"type":"electronic","value":"9783642366604"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36660-4_5","type":"book-chapter","created":{"date-parts":[[2013,2,1]],"date-time":"2013-02-01T11:14:43Z","timestamp":1359717283000},"page":"62-76","source":"Crossref","is-referenced-by-count":7,"title":["Automotive Proxy-Based Security Architecture for CE Device Integration"],"prefix":"10.1007","author":[{"given":"Alexandre","family":"Bouard","sequence":"first","affiliation":[]},{"given":"Johannes","family":"Schanda","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Herrscher","sequence":"additional","affiliation":[]},{"given":"Claudia","family":"Eckert","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Glass, M., Herrscher, D., Meier, H., Piastowski, M., Shoo, P.: SEIS - security in embedded ip-based systems. ATZelektronik worldwide, 2010-01, 36\u201340 (2010)","DOI":"10.1007\/BF03242255"},{"key":"5_CR2","unstructured":"Apache ETCH homepage, \n                    \n                      http:\/\/incubator.apache.org\/etch\/"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-540-87698-4_21","volume-title":"Computer Safety, Reliability, and Security","author":"T. Hoppe","year":"2008","unstructured":"Hoppe, T., Kiltz, S., Dittmann, J.: Security Threats to Automotive CAN Networks \u2013 Practical Examples and Selected Short-Term Countermeasures. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol.\u00a05219, pp. 235\u2013248. Springer, Heidelberg (2008)"},{"key":"5_CR4","first-page":"447","volume-title":"31st IEEE Symposium on Security and Privacy","author":"K. Koscher","year":"2010","unstructured":"Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental Security Analysis of a Modern Automobile. In: 31st IEEE Symposium on Security and Privacy, pp. 447\u2013462. IEEE Computer Society, Washington, DC (2010)"},{"key":"5_CR5","first-page":"6","volume-title":"20th USENIX Security Symposium","author":"S. Checkoway","year":"2011","unstructured":"Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive Experimental Analyses of Automotive Attack Surfaces. In: 20th USENIX Security Symposium, p. 6. USENIX Association, Berkeley (2011)"},{"key":"5_CR6","unstructured":"Weyl, B., et al.: EVITA Project, D3.2 - Secure On-board Architecture Specification. Technical Report (2010), \n                    \n                      http:\/\/evity-project.org\/"},{"key":"5_CR7","unstructured":"Wolf, M., Weimerskirch, A., Paar, C.: Security in Automotive Bus Systems. In: 2nd Workshop on Embedded Security in Cars (ESCAR 2004) (2004)"},{"key":"5_CR8","unstructured":"Bi\u00dfmeyer, N., et al.: simTD Security Architecture: Deployment of a Security and Privacy Architecture in Field Operational Tests. In: 7th Workshop on Embedded Security in Cars (ESCAR 2009) (2009)"},{"key":"5_CR9","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M. Raya","year":"2007","unstructured":"Raya, M., Hubaux, J.-P.: Securing Vehicular Ad hoc Networks. J. Comput. Secur.\u00a015, 39\u201368 (2007)","journal-title":"J. Comput. Secur."},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1016\/j.csi.2008.03.007","volume":"30","author":"K. Pl\u00f6\u00edl","year":"2008","unstructured":"Pl\u00f6\u00edl, K., Federrath, H.: A Privacy aware and Efficient Security Infrastructure for Vehicular Ad hoc Networks. J. Comput. Stand. Interfaces\u00a030, 390\u2013397 (2008)","journal-title":"J. Comput. Stand. Interfaces"},{"key":"5_CR11","unstructured":"Ferreira, A.: Android OS changes smartphone life cycle (2011), \n                    \n                      http:\/\/www.theusdvista.com\/mobile\/business\/android-os-changes-smartphone-life-cycle-1.2000033"},{"key":"5_CR12","volume-title":"International Conference on Parallel Computing","author":"H. Endt","year":"2011","unstructured":"Endt, H., Weckemann, K.: Remote Utilization of OpenCL for Flexible Computation Offloading Using Embedded ECUs, CE Devices and Cloud Servers. In: International Conference on Parallel Computing. IOS Press, Amsterdam (2011)"},{"key":"5_CR13","first-page":"1","volume-title":"9th USENIX Conference on Operating Systems Design and Implementation","author":"W. Enck","year":"2010","unstructured":"Enck, W., Gilbert, P., Chun, B., Cox, L., Jung, J., McDaniel, P., Sheth, A.: TaintDroid: an Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In: 9th USENIX Conference on Operating Systems Design and Implementation, pp. 1\u20136. USENIX Association, Berkeley (2010)"},{"key":"5_CR14","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/2046614.2046623","volume-title":"1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2011)","author":"M. Lange","year":"2011","unstructured":"Lange, M., Liebergeld, S., Lackorzynski, A., Warg, A., Peter, M.: L4Android: A Generic Operating System Framework for Secure Smartphones. In: 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2011), pp. 39\u201350. ACM, New York (2011)"},{"key":"5_CR15","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/1741866.1741874","volume-title":"3rd ACM Conference on Wireless Network Security (WiSec 2010)","author":"L. Xie","year":"2010","unstructured":"Xie, L., Zhang, X., Seifert, J.-P., Zhu, S.: pBMDS: a Behavior-based Malware Detection System for Cellphone Devices. In: 3rd ACM Conference on Wireless Network Security (WiSec 2010), pp. 37\u201348. ACM, New York (2010)"},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1145\/1377836.1377862","volume-title":"13th ACM Symposium on Access Control Models and Technologies (SACMAT 2008)","author":"D. Muthukumaran","year":"2008","unstructured":"Muthukumaran, D., Sawani, A., Schiffman, J., Jung, B.M., Jaeger, T.: Measuring Integrity on Mobile Phone Systems. In: 13th ACM Symposium on Access Control Models and Technologies (SACMAT 2008), pp. 155\u2013164. ACM, New York (2008)"},{"key":"5_CR17","first-page":"347","volume-title":"26th Annual Computer Security Applications Conference (ACSAC 2010)","author":"G. Portokalidis","year":"2010","unstructured":"Portokalidis, G., et al.: Paranoid Android: Versatile Protection for Smartphones. In: 26th Annual Computer Security Applications Conference (ACSAC 2010), pp. 347\u2013356. ACM, New York (2010)"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-13869-0_1","volume-title":"Trust and Trustworthy Computing","author":"M. Nauman","year":"2010","unstructured":"Nauman, M., Khan, S., Zhang, X., Seifert, J.-P.: Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol.\u00a06101, pp. 1\u201315. Springer, Heidelberg (2010)"},{"key":"5_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-642-21599-5_8","volume-title":"Trust and Trustworthy Computing","author":"I. Bente","year":"2011","unstructured":"Bente, I., Dreo, G., Hellmann, B., Heuser, S., Vieweg, J., von Helden, J., Westhuis, J.: Towards Permission-Based Attestation for the Android Platform. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol.\u00a06740, pp. 108\u2013115. Springer, Heidelberg (2011)"},{"key":"5_CR20","unstructured":"VOGUE Project homepage, \n                    \n                      http:\/\/www.vogue-project.de\/"},{"key":"5_CR21","unstructured":"Cisco NAC appliance - Clean Access Manager Installation and Configuration Guide, Release 4.9, \n                    \n                      http:\/\/www.cisco.com"},{"key":"5_CR22","unstructured":"Arjona, R.: An Introduction to IPsec VPNs on Mobile Phones (2009), \n                    \n                      http:\/\/msdn.microsoft.com\/en-us\/magazine\/ee412260.aspx"},{"key":"5_CR23","unstructured":"Bouard, A.: SEIS Projekt, AP4.3, Security der Middleware f\u00fcr IP-basierte Bordnetzarchitekturen (2011), \n                    \n                      http:\/\/www.strategiekreis-elektromobilitaet.de\/public\/projekte\/seis\/das-sichere-ip-basierte-fahrzeugbordnetz\/pdfs\/TP4_Vortrag2.pdf"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Weckemann, K., Satzger, F., Stolz, L., Herrscher, D., Linnhoff-Popien, C.: Lessons from a Minimal Middleware for IP-based In-Car Communication. In: Proceedings of the Intelligent Vehicles Symposium (IV), pp. 686\u2013691. IEEE (2012)","DOI":"10.1109\/IVS.2012.6232251"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile Wireless Middleware, Operating Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36660-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T21:02:52Z","timestamp":1557522172000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36660-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642366598","9783642366604"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36660-4_5","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2013]]}}}