{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:54Z","timestamp":1750307214511,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,3,26]],"date-time":"2012-03-26T00:00:00Z","timestamp":1332720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,3,26]]},"DOI":"10.1145\/2245276.2232039","type":"proceedings-article","created":{"date-parts":[[2012,6,11]],"date-time":"2012-06-11T13:03:31Z","timestamp":1339419811000},"page":"1640-1642","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Formal security policy models for smart card evaluations"],"prefix":"10.1145","author":[{"given":"Gerd","family":"Beuster","sequence":"first","affiliation":[{"name":"Fachhochschule Wedel, Wedel, Germany"}]},{"given":"Karin","family":"Greimel","sequence":"additional","affiliation":[{"name":"NXP Semiconductors Austria GmbH, Gratkorn, Austria"}]}],"member":"320","published-online":{"date-parts":[[2012,3,26]]},"reference":[{"unstructured":"R. Cavada A. Cimatti C. Jochim G. Keighren E. Olivetti M. Pistore M. Roveri and A. Tchaltsev. NuSMV 2.5 User Manual.  R. Cavada A. Cimatti C. Jochim G. Keighren E. Olivetti M. Pistore M. Roveri and A. Tchaltsev. NuSMV 2.5 User Manual .","key":"e_1_3_2_1_1_1"},{"unstructured":"Common Criteria for Information Technology Security Evaluation Version 3.1 Revision 3 July 2009. Common Criteria for Information Technology Security Evaluation Version 3.1 Revision 3 July 2009.","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.5555\/647771.734431"},{"unstructured":"European Smart Card Industry Association (Eurosmart). Security IC Platform Protection Profile Version 1.0 June 2007.  European Smart Card Industry Association (Eurosmart). Security IC Platform Protection Profile Version 1.0 June 2007.","key":"e_1_3_2_1_4_1"},{"volume-title":"Systems and Software Technology Conference (SSTC 2005)","year":"2005","author":"Greve D.","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/1217975.1217978"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1007\/978-3-540-71067-7_2"},{"doi-asserted-by":"crossref","unstructured":"David\n       \n      von Oheimb Georg\n       \n      Walter and \n      \n      \n      Volkmar\n       \n      Lotz\n    .\n      \n  \n   \n  A Formal Security Model of the Infineon SLE 88 Smart Card Memory Managment. In Einar Snekkenes and Dieter Gollmann editors ESORICS volume \n  2808\n   of \n  Lecture Notes in Computer Science pages \n  217\n  --\n  234\n  . \n  Springer 2003\n  .  David von Oheimb Georg Walter and Volkmar Lotz. A Formal Security Model of the Infineon SLE 88 Smart Card Memory Managment. In Einar Snekkenes and Dieter Gollmann editors ESORICS volume 2808 of Lecture Notes in Computer Science pages 217--234. Springer 2003.","key":"e_1_3_2_1_8_1","DOI":"10.1007\/978-3-540-39650-5_13"}],"event":{"sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"acronym":"SAC 2012","name":"SAC 2012: ACM Symposium on Applied Computing","location":"Trento Italy"},"container-title":["Proceedings of the 27th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2245276.2232039","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2245276.2232039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:44Z","timestamp":1750241204000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2245276.2232039"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,26]]},"references-count":8,"alternative-id":["10.1145\/2245276.2232039","10.1145\/2245276"],"URL":"https:\/\/doi.org\/10.1145\/2245276.2232039","relation":{},"subject":[],"published":{"date-parts":[[2012,3,26]]},"assertion":[{"value":"2012-03-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}