{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T12:06:58Z","timestamp":1648814818410},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T00:00:00Z","timestamp":1330560000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1007\/s11623-012-0060-3","type":"journal-article","created":{"date-parts":[[2012,3,4]],"date-time":"2012-03-04T15:30:30Z","timestamp":1330875030000},"page":"175-179","source":"Crossref","is-referenced-by-count":0,"title":["Sicherheitskern(e) f\u00fcr Smartphones: Ans\u00e4tze und L\u00f6sungen"],"prefix":"10.1007","volume":"36","author":[{"given":"Ammar","family":"Alkassar","sequence":"first","affiliation":[]},{"given":"Steffen","family":"Schulz","sequence":"additional","affiliation":[]},{"given":"Christian","family":"St\u00fcble","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,3,3]]},"reference":[{"key":"60_CR1","unstructured":"Selhorst, St\u00fcble, Gnaida, Feldmann: \u201eMoTrust.Embedded \u2014 Eine vertrauensw\u00fcrdige Sicherheitsplattform f\u00fcr Smartphones\u201c 12th German IT Security Congress, Bonn-Bad Godesberg, May 2011."},{"key":"60_CR2","unstructured":"Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry: Towards Taming priviledge escalation attacks on Android. Annual Network & Distributed System Security Symposium (NDSS), Februar 2012"},{"key":"60_CR3","doi-asserted-by":"crossref","unstructured":"Luigi Catuogno, Hans L\u00f6hr, Mark Manulis, Ahmad-Reza Sadeghi, Christian St\u00fcble und Marcel Winandy: Trusted Virtual Domains: Color Your Network. Datenschutz und Datensicherheit (DuD) 5\/2010, pp. 289\u2013294, Gabler Verlag, 2010.","DOI":"10.1007\/s11623-010-0089-0"},{"key":"60_CR4","unstructured":"Sirrix AG: High-Assurance Security Kernel Protection Profile (EAL5), according to the Common Criteria v3.1 R2, 2007, zertifiziert durch das Bundesamtf\u00fcr Sicherheit in der Informationstechnik (BSI) 2008."},{"key":"60_CR5","doi-asserted-by":"crossref","unstructured":"Matthias Lange, Steffen Liebergeld, Adam Lackorzynski, Alexander Warg, Michael Peter: \u201eL4Android: A Generic Operating System Framework for Secure Smartphones\u201c, In proceedings of the 2011 ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, Chicago, IL, USA, Oct 2011","DOI":"10.1145\/2046614.2046623"},{"key":"60_CR6","doi-asserted-by":"crossref","unstructured":"Eyad Alkassar, Mark A. Hillebrand, Wolfgang Paul und Elena Petrova: Automated Verification of a Small Hypervisor. In Proceedings of \u201cVerified Software: Theories, Tools, Experiments\u201d; Lecture Notes in Computer Science, 2010, Volume 6217\/2010, 40\u201354, Edinburgh, Scotland.","DOI":"10.1007\/978-3-642-15057-9_3"},{"key":"60_CR7","unstructured":"Ahmad-Reza Sadeghi, Christian St\u00fcble, Norbert Pohlmann: European Multilateral Secure Computing Base \u2014 Open Trusted Computing for You and Me; Datenschutz und Datensicherheit (DUD) 9\/2004, Vieweg Verlag, pp. 548\u2013554, 2004."},{"key":"60_CR8","doi-asserted-by":"crossref","unstructured":"Hans L\u00f6hr, Ahmad-Reza Sadeghi, Christian St\u00fcble, Marion Weber, Marcel Winandy: Modeling Trusted Computing Support in a Protection Profile for High Assurance Security kernels; Proceedings der TRUST 2009, Oxford.","DOI":"10.1007\/978-3-642-00587-9_4"},{"key":"60_CR9","doi-asserted-by":"crossref","unstructured":"Peter Hornyack, Seungyeop Han, Jaeyeon Jung, Stuart Schechter, and David Wetherall: \u201eThese Aren\u2019t the Droids You\u2019re Looking For\u201c: Retroffiting Android to Protect Data from Imperious Applications. ACM Conference on Computer and Communication Security (CCS), Oct 2011","DOI":"10.1145\/2046707.2046780"},{"key":"60_CR10","unstructured":"Stephen Smalley: The Case for SE Android, National Security Agency (NSA), 2011"},{"key":"60_CR11","doi-asserted-by":"crossref","unstructured":"Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Ahmad-Reza Sadeghi, Bhargava Shastry: Practical and Lightweight Domain Isolation on Android. In: Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM), ACM Press, Oct 2011.","DOI":"10.1145\/2046614.2046624"},{"key":"60_CR12","unstructured":"Soeren Heisrath, Christian St\u00fcble: Sirrix AG Technical Report No 12\/1102, August 2011."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0060-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-012-0060-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0060-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0060-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T18:27:49Z","timestamp":1561400869000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-012-0060-3"}},"subtitle":["Vom Mikrokern bis zu Capabilities \u2014 Verschiedene L\u00f6sungsans\u00e4tze f\u00fcr die App-Trennung und -Kontrolle"],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":12,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["60"],"URL":"https:\/\/doi.org\/10.1007\/s11623-012-0060-3","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,3]]}}}