{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T04:03:50Z","timestamp":1746504230184,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662452363"},{"type":"electronic","value":"9783662452370"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45237-0_58","type":"book-chapter","created":{"date-parts":[[2014,10,25]],"date-time":"2014-10-25T14:37:20Z","timestamp":1414247840000},"page":"636-650","source":"Crossref","is-referenced-by-count":2,"title":["Protection Profile for Secure Sensitive Information System on Mobile Devices"],"prefix":"10.1007","author":[{"given":"Imed","family":"El Fray","sequence":"first","affiliation":[]},{"given":"Tomasz","family":"Hyla","sequence":"additional","affiliation":[]},{"given":"W\u0142odzimierz","family":"Chocianowicz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"58_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-642-04474-8_29","volume-title":"Information Security","author":"Y.-Y. Chen","year":"2009","unstructured":"Chen, Y.-Y., Lee, R.B.: Hardware-Assisted Application-Level Access Control. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol.\u00a05735, pp. 363\u2013378. Springer, Heidelberg (2009)"},{"key":"58_CR2","unstructured":"Hyla, T., Peja\u015b, J., El Fray, I., Ma\u0107k\u00f3w, W., Chocianowicz, W.: Sensitive Information Protection on Mobile Devices Using General Access Structures. In: ICONS-IARIA, pp. 192\u2013196 (2014)"},{"key":"58_CR3","unstructured":"Peja\u015b, J., Hyla, T., Kry\u0144ski, J.: ORCON access control monitored by the initiator: theoretical and practical implementation method. In: National Conference on Cybercrime and Information Security, Warsaw, Poland, 21 pages (2012)"},{"key":"58_CR4","unstructured":"Protection of sensitive information, Polish Act of 5 August 2010, Dz.U. 2010 nr 182 position 1228"},{"key":"58_CR5","unstructured":"Ho\u0142yst, B., Pomyka\u0142a, J.: Cybercrime, information security and cryptology. Prosecution and Law, 30 (2011)"},{"key":"58_CR6","unstructured":"Bishop, M.: Computer Security: Art and Science. Addison Wesley (2002)"},{"key":"58_CR7","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communication of the ACM\u00a022, 612\u2013613 (1979)","journal-title":"Communication of the ACM"},{"key":"58_CR8","doi-asserted-by":"crossref","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys. In: AFIPS, pp. 313\u2013317 (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"key":"58_CR9","doi-asserted-by":"crossref","unstructured":"Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. In: Goldwasser, S. (ed.) Advances in Cryptology - CRYPTO 1988. LNCS, vol.\u00a0403, pp. 27\u201335. Springer, Heidelberg (1990)","DOI":"10.1007\/0-387-34799-2_3"},{"key":"58_CR10","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s00145-006-0334-8","volume":"20","author":"T. Tassa","year":"2007","unstructured":"Tassa, T.: Hierarchical threshold secret sharing. Journal of Cryptology\u00a020, 237\u2013264 (2007)","journal-title":"Journal of Cryptology"},{"key":"58_CR11","doi-asserted-by":"crossref","first-page":"70","DOI":"10.26636\/jtit.2009.2.930","volume":"2","author":"B. Nakielski","year":"2009","unstructured":"Nakielski, B., Pomyka\u0142a, J.: Simple dynamic threshold decryption based on CRT and RSA. Journal of Telecommunications and Information Technology\u00a02, 70\u201373 (2009)","journal-title":"Journal of Telecommunications and Information Technology"},{"key":"58_CR12","unstructured":"ISO\/IEC 15408, Information technology \u2014 Security techniques \u2014 Evaluation criteria for IT security, Part 1: Introduction and general model (2012)"},{"key":"58_CR13","unstructured":"ISO\/IEC 15408, Information technology \u2014 Security techniques \u2014 Evaluation criteria for IT security, Part 2: Security functional requirements (2012)"},{"key":"58_CR14","unstructured":"ISO\/IEC 15408, Information technology \u2014 Security techniques \u2014 Evaluation criteria for IT security, Common Methodology for Information Technology Security Evaluation (2012)"},{"key":"58_CR15","unstructured":"Fortinet\u2019s FortiGuard Labs, Reveals Newest of mobile Malware Trends in Latest Threat Report, http:\/\/www.fortinet.com\/resource_center\/whitepapers\/threat-landscape-report-2014.html"},{"key":"58_CR16","unstructured":"F-Secure, Mobile threat report, http:\/\/www.f-secure.com\/static\/doc\/labs_global\/Research\/Mobile_Threat_Report_Q3_2013.pdf"},{"key":"58_CR17","unstructured":"El Fray, I.: Method of determining the trust in the information system based on the process of assessing and treating risk, monograph Informatics, West Pomeranian University of Technology of Szczecin (2013)"},{"key":"58_CR18","first-page":"283","volume":"752","author":"I. Fray El","year":"2003","unstructured":"El Fray, I.: About some application of risk analysis and evaluation. Kluwer International Series in Engineering and Computer Science\u00a0752, 283\u2013292 (2003)","journal-title":"Kluwer International Series in Engineering and Computer Science"},{"key":"58_CR19","unstructured":"Protection Profile for Mobile Device Fundamentals, NIAP (2013)"},{"key":"58_CR20","unstructured":"Protection Profile for Mobile Device Management, NIAP (2013)"},{"key":"58_CR21","unstructured":"Protection Profile for Network Devices, NIAP (2012)"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45237-0_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T13:48:18Z","timestamp":1746452898000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45237-0_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662452363","9783662452370"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45237-0_58","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}