{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:56:33Z","timestamp":1743018993680,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":16,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048191116"},{"type":"electronic","value":"9789048191123"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-9112-3_49","type":"book-chapter","created":{"date-parts":[[2010,6,23]],"date-time":"2010-06-23T15:55:19Z","timestamp":1277308519000},"page":"291-295","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security of Virtualized Applications: Microsoft App-V and VMware ThinApp"],"prefix":"10.1007","author":[{"given":"Michael","family":"Hoppe","sequence":"first","affiliation":[]},{"given":"Patrick","family":"Seeling","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,5,20]]},"reference":[{"key":"49_CR1","unstructured":"M. Tulloch et al., Understanding Microsoft Virtualization Solutions: From the Desktop to the Datacenter. Microsoft Press, 2009."},{"key":"49_CR2","unstructured":"Microsoft, Inc., \u201cMicrosoft application virtualization (app-v) 4.5.\u201d [Online]. Available: http:\/\/www.microsoft.com\/systemcenter\/appv\/default.mspx"},{"key":"49_CR3","unstructured":"VMware, Inc., \u201cVmware thinapp 4.03.\u201d [Online]. Available: http:\/\/www.vmware.com\/products\/thinapp\/"},{"key":"49_CR4","doi-asserted-by":"crossref","unstructured":"Y. Yu, F. Guo, S. Nanda, L.-C. Lam, and T.-C. Chiueh, \u201cA featherweight virtual machine for windows applications,\u201d in Proceedings of the 2nd international Conference on Virtual Execution Environments (VEE), 2006, pp. 24\u201334.","DOI":"10.1145\/1134760.1134766"},{"key":"49_CR5","unstructured":"N. Ruest and D. Ruest, Virtualization, A Beginner\u2019s Guide. McGraw-Hill, Mar. 2009."},{"issue":"5","key":"49_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MSP.2008.136","volume":"6","author":"S.T. King","year":"2008","unstructured":"S. T. King and S. W. Smith, \u201cVirtualization and security: Back to the future,\u201d IEEE Security and Privacy, vol. 6, no. 5, p. 15, Sep. 2008.","journal-title":"IEEE Security and Privacy"},{"issue":"5","key":"49_CR7","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2008.135","volume":"6","author":"R. Perez","year":"2008","unstructured":"R. Perez, L. van Doorn, and R. Sailer, \u201cVirtualization and hardware-based security,\u201d IEEE Security and Privacy, vol. 6, no. 5, pp. 24\u201331, Sep. 2008.","journal-title":"IEEE Security and Privacy"},{"issue":"8","key":"49_CR8","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MC.2008.276","volume":"41","author":"S.J. Vaughan-Nichols","year":"2008","unstructured":"S. J. Vaughan-Nichols, \u201cVirtualization sparks security concerns,\u201d Computer, vol. 41, no. 8, pp. 13\u201315, 2008.","journal-title":"Computer"},{"key":"49_CR9","doi-asserted-by":"crossref","unstructured":"E. Ray and E. Schultz, \u201cVirtualization security,\u201d in Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW), Apr. 2009, pp. 1\u20135.","DOI":"10.1145\/1558607.1558655"},{"key":"49_CR10","unstructured":"Microsoft, Inc., App-V Security Best Practices, Sep. 2008."},{"key":"49_CR11","unstructured":"\u2014\u2014, App-V Security Operations Guide, Sep. 2008."},{"key":"49_CR12","unstructured":"VMware, Inc., ThinApp Users Guide -ThinApp 4.0.3, 2009."},{"key":"49_CR13","unstructured":"A. Sabri and K. Shah, \u201cTake your apps virtual with microsoft softgrid,\u201d Microsoft TechNet Magazine, Aug. 2007. [Online]. Available: http:\/\/technet.microsoft.com\/en-us\/magazine\/2007.08.softgrid.aspx"},{"key":"49_CR14","unstructured":"Metasploit LLC, \u201cThe metasploit project.\u201d [Online]. Available: http:\/\/www.metasploit.com\/"},{"key":"49_CR15","unstructured":"D. Maynor, Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Syngress, Oct. 2007."},{"key":"49_CR16","unstructured":"R. Tzur, \u201cSandboxie 3.4,\u201d Sep. 2009. [Online]. Available: http:\/\/www.sandboxie.com"}],"container-title":["Innovations in Computing Sciences and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-9112-3_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T11:05:04Z","timestamp":1710846304000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-9112-3_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9789048191116","9789048191123"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-9112-3_49","relation":{},"subject":[],"published":{"date-parts":[[2010]]},"assertion":[{"value":"20 May 2010","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}