{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T20:56:22Z","timestamp":1648760182498},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2012,9,1]],"date-time":"2012-09-01T00:00:00Z","timestamp":1346457600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1007\/s11623-012-0221-4","type":"journal-article","created":{"date-parts":[[2012,9,26]],"date-time":"2012-09-26T01:04:08Z","timestamp":1348621448000},"page":"657-661","source":"Crossref","is-referenced-by-count":0,"title":["Plattformsicherheit \u2014 wie aktuell sind jahrzehntealte Konzepte heute?"],"prefix":"10.1007","volume":"36","author":[{"given":"Kai","family":"Martius","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Senier","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,9,14]]},"reference":[{"key":"221_CR1","doi-asserted-by":"crossref","unstructured":"J. Alves-Foss, C. Taylor, and P. Oman. A multi-layered approach to security in high assurance systems. In System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on, pages 10-pp. IEEE, 2004.","DOI":"10.1109\/HICSS.2004.1265709"},{"key":"221_CR2","doi-asserted-by":"crossref","unstructured":"J.P. Anderson. Computer Security Technology Planning Study Vol I. Prepared for Electronic Systems Division, October, pages 758\u2013206, 1972.","DOI":"10.21236\/AD0772806"},{"key":"221_CR3","unstructured":"ARINC Incorporated. 653P1-3: Avionics Application Software Standard Interface, Part 1, Required Services, November 2011."},{"key":"221_CR4","doi-asserted-by":"crossref","unstructured":"C. Boettcher, R. DeLong, J. Rushby, and W. Sifre. The MILS component integration approach to secure information sharing. In Digital Avionics Systems Conference, 2008. DASC 2008. IEEE\/AIAA 27th, pages 1-C. IEEE, 2008.","DOI":"10.1109\/DASC.2008.4702758"},{"key":"221_CR5","unstructured":"Common Methodology for Information Technology Security Evaluation \u2014 Evaluation methodology, July 2009."},{"key":"221_CR6","unstructured":"N. Feske and C. Helmuth. A Nitpicker\u2019s guide to a minimal-complexity secure GUI. 2005."},{"key":"221_CR7","doi-asserted-by":"crossref","unstructured":"Michael Hohmuth, Michael Peter, Hermann H\u00e4rtig, and Jonathan S. Shapiro. Reducing TCB size by using untrusted components \u2014 small kernels versus virtual-machine monitors. In IN PROC. OF THE 11TH ACM SIGOPS EUROPEAN WORKSHOP, page 22. ACM Press, 2004.","DOI":"10.1145\/1133572.1133615"},{"key":"221_CR8","unstructured":"C. Helmuth, A. Westfeld, and M. Sobirey. \u03bcSINA \u2014 Eine mikrokernbasierte Systemarchitektur fur sichere Systemkomponenten. In Deutscher IT-Sicherheitskongress des BSI, Volume 8, IT-Sicherheit im verteilten Chaos, page 439\u2013453. Secumedia-Verlag Ingelsheim, 2003."},{"key":"221_CR9","unstructured":"ISO. Information Technology \u2014 Programming Languages \u2014 Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use. Technical report ISO\/IEC TR 24772, Baseline Edition-2, WG 23\/N 0352 (DRAFT), International Organization for Standardization, Geneva, Switzerland, 2011."},{"issue":"5","key":"221_CR10","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1145\/224057.224075","volume":"29","author":"J. Liedtke","year":"1995","unstructured":"J. Liedtke. On micro-kernel construction. ACM SIGOPS Operating Systems Review, 29(5):237\u2013250, 1995.","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"221_CR11","doi-asserted-by":"crossref","unstructured":"D. Osvik, A. Shamir, and E. Tromer. Cache attacks and countermeasures: The case of AES. Topics in Cryptology-CT-RSA 2006, pages 1\u201320, 2006.","DOI":"10.1007\/11605805_1"},{"key":"221_CR12","unstructured":"C. Percival. Cache missing for fun and profit. BSDCan 2005, 2005."},{"key":"221_CR13","doi-asserted-by":"crossref","unstructured":"John Rushby. The Design and Verification of Secure Systems. In Eighth ACM Symposium on Operating System Principles (SOSP), pages 12\u201321, Asilomar, CA, December 1981. (ACM Operating Systems Review, Vol. 15, No. 5).","DOI":"10.1145\/800216.806586"},{"key":"221_CR14","doi-asserted-by":"crossref","unstructured":"Y. Zhang, A. Juels, A. Oprea, and M.K. Reiter. HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis. In Proceedings of the 2011 IEEE Symposium on Security and Privacy (Oakland), pages 313\u2013328, May 2011.","DOI":"10.1109\/SP.2011.31"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0221-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-012-0221-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0221-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0221-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T02:16:36Z","timestamp":1562206596000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-012-0221-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":14,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2012,9]]}},"alternative-id":["221"],"URL":"https:\/\/doi.org\/10.1007\/s11623-012-0221-4","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,9]]}}}