{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T13:08:33Z","timestamp":1649077713444},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2012,10,23]],"date-time":"2012-10-23T00:00:00Z","timestamp":1350950400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1007\/s11623-012-0277-1","type":"journal-article","created":{"date-parts":[[2012,10,22]],"date-time":"2012-10-22T00:45:31Z","timestamp":1350866731000},"page":"810-813","source":"Crossref","is-referenced-by-count":2,"title":["OWASP Top 10: Zwei Jahre danach"],"prefix":"10.1007","volume":"36","author":[{"given":"Dirk","family":"Wetter","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,10,23]]},"reference":[{"key":"277_CR1","unstructured":"Steve Christey, Robert A. Martin: Vulnerability Type Distributions in CVE. MITRE, 22.05.2007. \n                    http:\/\/cwe.mitre.org\/documents\/vuln-trends\/index.html"},{"key":"277_CR2","unstructured":"J.D. Meier, Alex Mackman, Michael Dunner, Srinath Vasireddy, Ray Escamilla, Anandha Murukan: Improving Web Application Security: Threats and Countermeasures. Microsoft Patterns & Practice, Chapter 3: Threat Modelling, June 2003. \n                    http:\/\/msdn.microsoft.com\/en-us\/library\/ff648644.aspx"},{"key":"277_CR3","unstructured":"Dana Epp: Secure Software Programming: DREAD is Dead. 15.11.2005. \n                    http:\/\/silverstr.ufies.org\/blog\/archives\/000875.html"},{"key":"277_CR4","unstructured":"Dirk Wetter: OWASP Top 10: Was nun? 20.10.2012. \n                    http:\/\/drwetter.eu\/talks\/OWASP_T10-Was-tnun.pdf"},{"key":"277_CR5","unstructured":"Heise Security: Schwachstelle beim Postbank-Onlinebanking. 13.03.2008. \n                    http:\/\/www.heise.de\/-190238"},{"key":"277_CR6","unstructured":"OWASP: OWASP Risk Rating Methodology. \n                    https:\/\/www.owasp.org\/index.php\/OWASP_Risk_Rating_Methodology"},{"key":"277_CR7","unstructured":"OWASP: OWASP Testing Guide v3. \n                    https:\/\/www.owasp.org\/index.php\/OWASP_Testing_Guide_v3_Table_of_Contents"},{"key":"277_CR8","unstructured":"OWASP: OWASP Application Testing Guide v4. \n                    https:\/\/www.owasp.org\/index.php\/OWASP_Application_Testing_guide_v4"},{"key":"277_CR9","unstructured":"Golem.de: Sch\u00e4uble gehackt. 11.02.2009:. \n                    http:\/\/www.golem.de\/0902\/65186.html"},{"key":"277_CR10","unstructured":"Die S\u00fcddeutsche: Das Internet entl\u00e4sst Kuranyi. 11.02.2009. \n                    http:\/\/www.sueddeutsche.de\/sport\/fussball-bundesliga-fc-schalke-das-internetentlaesst-kuranyi-1.470299"},{"key":"277_CR11","unstructured":"OWASP: OWASP Top 10 Cheet Sheet. \n                    https:\/\/www.owasp.org\/index.php\/OWASP_Top_Ten_Cheat_Sheet"},{"key":"277_CR12","unstructured":"OWASP: Cheat Sheets. \n                    https:\/\/www.owasp.org\/index.php\/Cheat_Sheets"},{"key":"277_CR13","unstructured":"OWASP: OWASP Cloud Top 10 Security Risks. \n                    https:\/\/www.owasp.org\/index.php\/Category:OWASP_Cloud_%E2%80%90_10_Project"},{"key":"277_CR14","unstructured":"OWASP: Top 10 Mobile Risks. \n                    https:\/\/www.owasp.org\/index.php\/OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks\n                    \n                  , Slides mit Erkl\u00e4rungen: \n                    http:\/\/www.slideshare.net\/JackMannino\/owasp-top-10-mobile-risks\n                    \n                  ."},{"key":"277_CR15","unstructured":"Justin Case: Vulnerability In Skype For Android Is Exposing Your Name, Phone Number, Chat Logs, And A Lot More. 05.06.2012 (Update). \n                    http:\/\/www.androidpolice.com\/2011\/04\/14\/exclusive-vulnerability-in-skypefor-android-is-exposing-your-name-phone-number-chat-logs-and-alot-more\/"},{"key":"277_CR16","unstructured":"Bugzilla@Mozilla: Bug 650509: Other apps can read Firefox profile files. 16.04.2011. \n                    https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=650509"},{"key":"277_CR17","unstructured":"The Wall Street Journal: Citi Discloses Security Flaw in Its iPhone App. 27.07.2010. \n                    http:\/\/online.wsj.com\/article\/SB10001424052748703700904575391273536355324.html"},{"key":"277_CR18","unstructured":"Bastian K\u00f6nings, Jens Nickels, and Florian Schaub: Catching AuthTokens in the Wild: The Insecurity of Google\u2019s ClientLogin Protocol. 15.06.2011 (Update). \n                    http:\/\/www.uni-ulm.de\/in\/mi\/mitarbeiter\/koenings\/catching-authtokens.html"},{"key":"277_CR19","unstructured":"Jack Mannino: Scary, Scary Mobile Banking. 01.02.2011. \n                    http:\/\/jack-mannino.blogspot.de\/2011\/02\/scary-scary-mobile-banking.html"},{"key":"277_CR20","unstructured":"OWASP: OWASP Mobile Security Project. \n                    https:\/\/www.owasp.org\/index.php\/OWASP_Mobile_Security_Project"},{"key":"277_CR21","unstructured":"OWASP: Top 10 Mobile Controls. \n                    https:\/\/www.owasp.org\/index.php\/Projects\/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Controls"},{"key":"277_CR22","unstructured":"enisa: Smartphone Secure Development Guidelines. 25.11.2011. \n                    http:\/\/www.enisa.europa.eu\/activities\/application-security\/smartphone-security-1\/smartphone-secure-development-guidelines"},{"key":"277_CR23","unstructured":"OWASP: IOS Developer Cheat Sheet. \n                    https:\/\/www.owasp.org\/index.php\/IOS_Developer_Cheat_Sheet"},{"key":"277_CR24","unstructured":"OWASP: Security Testing Guide. OWASP Mobile Security Project. \n                    https:\/\/www.owasp.org\/index.php\/Projects\/OWASP_Mobile_Security_Project_-_Security_Testing_Guide"},{"key":"277_CR25","unstructured":"OWASP: OWASP GoatDroid Project. \n                    https:\/\/www.owasp.org\/index.php\/OWASP_Mobile_Security_Project#OWASP_GoatDroid_Project"},{"key":"277_CR26","unstructured":"OWASP: QuickStartGuide (GoatDroid). 22.08.2011 (Update). \n                    http:\/\/code.google.com\/p\/owasp-goatdroid\/wiki\/QuickStartGuide"},{"key":"277_CR27","unstructured":"Dirk Wetter: Die 10 gr\u00f6\u00dften Risiken f\u00fcr Webanwendungen des Open Web Application Security Project. 25.06.2010. \n                    http:\/\/www.heise.de\/-1028905"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0277-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-012-0277-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0277-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0277-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:22:34Z","timestamp":1559413354000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-012-0277-1"}},"subtitle":["Risiken, Verteidigung und Mobile Sicherheit"],"short-title":[],"issued":{"date-parts":[[2012,10,23]]},"references-count":27,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2012,11]]}},"alternative-id":["277"],"URL":"https:\/\/doi.org\/10.1007\/s11623-012-0277-1","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,10,23]]}}}