{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:48:14Z","timestamp":1725727694694},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642383229"},{"type":"electronic","value":"9783642383236"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38323-6_2","type":"book-chapter","created":{"date-parts":[[2013,5,29]],"date-time":"2013-05-29T05:02:28Z","timestamp":1369803748000},"page":"17-32","source":"Crossref","is-referenced-by-count":2,"title":["Middleware-Based Security and Privacy for In-car Integration of Third-Party Applications"],"prefix":"10.1007","author":[{"given":"Alexandre","family":"Bouard","sequence":"first","affiliation":[]},{"given":"Maximilian","family":"Graf","sequence":"additional","affiliation":[]},{"given":"Dennis","family":"Burgkhardt","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Lutz Z. Renault debuts R-Link, engadget and Renault press release at LeWeb 2011 (2011)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental Security Analysis of a Modern Automobile. In: Proc. of the 31st IEEE S&P, pp. 447\u2013462. IEEE (2010)","DOI":"10.1109\/SP.2010.34"},{"key":"2_CR3","unstructured":"Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive Experimental Analyses of Automotive Attack Surfaces. In: Proc. of the 20th USENIX SEC, p. 6. USENIX (2011)"},{"key":"2_CR4","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/BF03242255","volume":"2010-01","author":"M. Glass","year":"2010","unstructured":"Glass, M., Herrscher, D., Meier, H., Piastowski, M., Shoo, P.: SEIS - Security in Embedded IP-based Systems. ATZelektronik Worldwide\u00a02010-01, 36\u201340 (2010)","journal-title":"ATZelektronik Worldwide"},{"key":"2_CR5","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-36660-4_5","volume-title":"Mobile Wireless Middleware, Operating Systems, and Applications","author":"A. Bouard","year":"2013","unstructured":"Bouard, A., Schanda, J., Herrscher, D., Eckert, C.: Automotive Proxy-based Security Architecture for CE Device Integration. In: Borcea, C., Bellavista, P., Gianelli, C., Magedanz, T., Schreiner, F. (eds.) Mobilware 2012. LNICST, vol.\u00a065, pp. 62\u201376. Springer, Heidelberg (2013)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Kemerlis, V., Portokalidis, G., Jee, K., Keromytis, A.: libdft: Practical dynamic data flow tracking for commodity systems. In: Proc. of the 8th ACM SIGPLAN\/SIGOPS VEE, pp. 121\u2013132. ACM (2012)","DOI":"10.1145\/2151024.2151042"},{"key":"2_CR7","unstructured":"Etch homepage, \n                    \n                      http:\/\/incubator.apache.org\/etch\/"},{"key":"2_CR8","unstructured":"Maier, A.: Ethernet - The standard for In-car Communication. In: 2nd Ethernet & IP @ Automotive Technology Day (2012)"},{"key":"2_CR9","unstructured":"Bouard, A., Glas, B., Jentzsch, A., Kiening, A., Kittel, T., Weyl, B.: Driving Automotive Middleware Towards a Secure IP-based Future. In: 10th Escar (2012)"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Mecklenbrauker, C.F., Molisch, A.F., Karedal, J., Tufvesson, F., Paier, A., Bernado, L., Zemen, T., Klemp, O., Czink, N.: Vehicular Channel Characterization and Its Implications for Wireless System Design and Performance. Proc. of the IEEE Special Issue on Vehicular Communications\u00a099(7) (2011)","DOI":"10.1109\/JPROC.2010.2101990"},{"key":"2_CR11","unstructured":"Fujitsu Semiconductor Europe, Fujitsu Announces Powerful MCU with Secure Hardware Extension (SHE) for Automotive Instrument Clusters. Fujitsu Press (2012), Release at \n                    \n                      http:\/\/www.fujitsu.com"},{"issue":"11","key":"2_CR12","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/MCOM.2008.4689253","volume":"46","author":"F. Kargl","year":"2008","unstructured":"Kargl, F., Papadimitratos, P., Buttyan, L., Muter, M., Schoch, E., Wiedersheim, B., Thong, T.V., Calandriello, G., Held, A., Kung, A., Hubaux, J.P.: Secure vehicular communication systems: implementation, performance, and research challenges. IEEE Communications\u00a046(11), 110\u2013118 (2008)","journal-title":"IEEE Communications"},{"key":"2_CR13","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-642-15476-8_16","volume-title":"Communications: Wireless in Developing Countries and Networks of the Future","author":"K.-O. Detken","year":"2010","unstructured":"Detken, K.-O., Fhom, H.S., Sethmann, R., Diederich, G.: Leveraging Trusted Network Connected for Secure Connection of Mobile Devices to Corporate Networks. In: Pont, A., Pujolle, G., Raghavan, S.V. (eds.) WCITD\/NF 2010. IFIP AICT, vol.\u00a0327, pp. 158\u2013169. Springer, Heidelberg (2010)"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Yin, H., Song, D., Egele, M., Kruegel, C., Kirda, E.: Panorama: Capturing Systemwide Information Flow for Malware Detection and Analysis. In: Proc. of the 14th ACM CCS, pp. 116\u2013127. ACM (2007)","DOI":"10.1145\/1315245.1315261"},{"key":"2_CR15","unstructured":"Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In: Proc. of the 9th OSDI, pp. 393\u2013407. USENIX (2010)"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-642-25141-2_8","volume-title":"Advances in Information and Computer Security","author":"A. Zavou","year":"2011","unstructured":"Zavou, A., Portokalidis, G., Keromytis, A.D.: Taint-Exchange: A Generic System for Cross-process and Cross-host Taint Tracking. In: Iwata, T., Nishigaki, M. (eds.) IWSEC 2011. LNCS, vol.\u00a07038, pp. 113\u2013128. Springer, Heidelberg (2011)"},{"key":"2_CR17","unstructured":"Schweppe, H., Roudier, Y.: Security and Privacy for In-vehicle Networks. In: Proc. of the 1st IEEE VCSC. IEEE (2010)"},{"key":"2_CR18","unstructured":"Pin homepage, A Dynamic Binary Instrumentation Tool, \n                    \n                      http:\/\/www.pintool.org\/"},{"issue":"3","key":"2_CR19","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/S0963-8687(02)00022-7","volume":"11","author":"V. Shankar","year":"2002","unstructured":"Shankar, V., Urbam, G., Sultan, F.: Online trust: a stakeholder perspective, concepts, implications, an future directions. Journal of Strategic Information Systems\u00a011(3), 325\u2013344 (2002)","journal-title":"Journal of Strategic Information Systems"},{"key":"2_CR20","unstructured":"Gutowska, A.: Research in Online Trust: Trust Taxonomy as A Multi-Dimensional Model. Technical Report, School of Computing and Information Technology, University of Wolverhampton (2007)"},{"issue":"3","key":"2_CR21","doi-asserted-by":"crossref","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"R.C. Mayer","year":"1995","unstructured":"Mayer, R.C., Davis, J.H., Schoorman, F.D.: An Integrative Model of Organizational Trust. The Academy of Management Review\u00a020(3), 709\u2013734 (1995)","journal-title":"The Academy of Management Review"},{"key":"2_CR22","unstructured":"Ling, T.C., et al.: Baker & McKenzie - Global Privacy Handbook. In: IACCM (2012)"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Weckemann, K., Satzger, F., Stolz, L., Herrscher, D., Linnhoff-Popien, C.: Lessons from a Minimal Middleware for IP-based In-car Communication. In: Proc. of the IEEE IV 2012, pp. 686\u2013691. IEEE (2012)","DOI":"10.1109\/IVS.2012.6232251"},{"key":"2_CR24","unstructured":"BMW AG web site. Navigation system Professional, \n                    \n                      http:\/\/www.bmw.com\/com\/en\/insights\/technology\/technology_guide\/articles\/navigation_system.html"},{"key":"2_CR25","unstructured":"Facebook homepage, \n                    \n                      http:\/\/www.facebook.com\/"},{"key":"2_CR26","unstructured":"Safebook homepage, \n                    \n                      http:\/\/www.safebook.us\/home.html"},{"key":"2_CR27","unstructured":"Xen\n                    \n                      \n                    \n                    $\\textsuperscript{\\textregistered}$\n                   hypervisor homepage, \n                    \n                      http:\/\/www.xen.org\/"},{"key":"2_CR28","unstructured":"Garfinkel, T., Rosenblum, M.: A Virtual Machine Introspection Based Architecture for Intrusion Detection. In: Proc. of NDSS Symposium 2003. Internet Society (2003)"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management VII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38323-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:07:26Z","timestamp":1557749246000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38323-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642383229","9783642383236"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38323-6_2","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]}}}