{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T06:05:52Z","timestamp":1747893952664,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380266"},{"type":"electronic","value":"9783642380273"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38027-3_88","type":"book-chapter","created":{"date-parts":[[2013,5,4]],"date-time":"2013-05-04T15:40:44Z","timestamp":1367682044000},"page":"788-795","source":"Crossref","is-referenced-by-count":2,"title":["Security Requirement of End Point Security Software"],"prefix":"10.1007","author":[{"given":"Hyun-Jung","family":"Lee","sequence":"first","affiliation":[]},{"given":"Youngsook","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"88_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/11424826_53","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2005","author":"S.-Y. Lee","year":"2005","unstructured":"Lee, S.-Y., Shin, M.-C.: Protection Profile for Software Development Site. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Lagan\u00e1, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol.\u00a03481, pp. 499\u2013507. Springer, Heidelberg (2005)"},{"key":"88_CR2","unstructured":"Common Criteria, Common Criteria for Information Technology Security Evaluation; part 1: Introduction and general model, Version 3.1 R1, CCMB-2006-09-001 (September 2006)"},{"key":"88_CR3","unstructured":"Common Criteria, Common Criteria for Information Technology Security Evaluation; part 2: Security functional components, Version 3.1 R2, CCMB-2007-09-002 (September 2007)"},{"key":"88_CR4","unstructured":"Common Criteria, Common Criteria for Information Technology Security Evaluation; part 3: Security assurance components, Version 3.1 R2, CCMB-2007-09-003 (September 2007)"},{"key":"88_CR5","unstructured":"Common Criteria Portal, http:\/\/www.commmoncriteiaportal.org"},{"key":"88_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-642-27142-7_37","volume-title":"Future Generation Information Technology","author":"H.-J. Lee","year":"2011","unstructured":"Lee, H.-J., Won, D.: Protection Profile for Data Leakage Protection System. In: Kim, T.-H., Adeli, H., Slezak, D., Sandnes, F.E., Song, X., Chung, K.-I., Arnett, K.P. (eds.) FGIT 2011. LNCS, vol.\u00a07105, pp. 316\u2013326. Springer, Heidelberg (2011)"},{"key":"88_CR7","doi-asserted-by":"crossref","unstructured":"Lee, H.-J., Won, D.: Protection Profile for Personal Information Security System. In: IEEE TrustCom 2011, pp. 806\u2013811 (2011)","DOI":"10.1109\/TrustCom.2011.106"},{"key":"88_CR8","unstructured":"Information Assurance Directorate, Network Device Protection Profile (NDPP) Extended Package Stateful Traffic Filter Firewall Version 1.0 (December 2011)"},{"key":"88_CR9","unstructured":"Information Assurance Directorate: Protection Profile for Network Devices Version 1.1 (June 2012)"}],"container-title":["Lecture Notes in Computer Science","Grid and Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38027-3_88","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T08:38:42Z","timestamp":1746002322000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38027-3_88"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380266","9783642380273"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38027-3_88","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}