{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:46:30Z","timestamp":1725795990856},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662438619"},{"type":"electronic","value":"9783662438626"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43862-6_9","type":"book-chapter","created":{"date-parts":[[2014,6,24]],"date-time":"2014-06-24T23:51:34Z","timestamp":1403653894000},"page":"69-73","source":"Crossref","is-referenced-by-count":7,"title":["Outsourcing Mobile Security in the Cloud"],"prefix":"10.1007","author":[{"given":"Ga\u00ebtan","family":"Hurel","sequence":"first","affiliation":[]},{"given":"R\u00e9mi","family":"Badonnel","sequence":"additional","affiliation":[]},{"given":"Abdelkader","family":"Lahmadi","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Festor","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"IDC Forecasts Worldwide Tablet Shipments to Surpass Portable PC Shipments in 2013, Total PC Shipments in 2015, \n \n http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS24129713\n \n \n (last visited in February 2014)"},{"key":"9_CR2","unstructured":"More Smartphones Were Shipped in Q1 2013 Than Feature Phones, An Industry First According to IDC, \n \n http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS24085413\n \n \n (last visited in February 2014)"},{"key":"9_CR3","unstructured":"The Open Vulnerability and Assessment Language (OVAL), \n \n http:\/\/oval.mitre.org\/\n \n \n (last visited in February 2014)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Barr\u00e8re, M., Hurel, G., Badonnel, R., Festor, O.: A Probabilistic Cost-efficient Approach for Mobile Security Assessment. In: Proceedings of the 9th IFIP\/IEEE International Conference on Network and Service Management, CNSM 2013 (2013)","DOI":"10.1109\/CNSM.2013.6727842"},{"key":"9_CR5","unstructured":"Barr\u00e8re, M., Hurel, G., Badonnel, R., Festor, O.: Ovaldroid: An OVAL-based vulnerability assessment framework for Android. In: Proceedings of the 13th IFIP\/IEEE International Symposium on Integrated Network Management (IM 2013), pp. 1074\u20131075 (2013)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Jin, R., Wang, B.: Malware Detection for Mobile Devices Using Software-Defined Networking. In: Proceedings of the 2nd GENI Research and Educational Experiment Workshop (GREE 2013), pp. 81\u201388 (2013)","DOI":"10.1109\/GREE.2013.24"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Kilinc, C., Booth, T., Andersson, K.: WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS. In: Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), pp. 877\u2013883 (2012)","DOI":"10.1109\/TrustCom.2012.298"},{"key":"9_CR8","unstructured":"Kim, T., Choi, Y., Han, S., Chung, J.Y., Hyun, J., Li, J., Hong, J.W.: Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure. In: Proceedings of the 12th IEEE\/IFIP Network Operations and Management Symposium (NOMS 2012), pp. 1303\u20131310 (2012)"},{"issue":"1","key":"9_CR9","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MSP.2013.15","volume":"11","author":"Q. Li","year":"2013","unstructured":"Li, Q., Clark, G.: Mobile security: A look ahead. IEEE Security and Privacy\u00a011(1), 78\u201381 (2013)","journal-title":"IEEE Security and Privacy"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Oberheide, J., Veeraraghavan, K., Cooke, E., Flinn, J., Jahanian, F.: Virtualized In-Cloud Security Services for Mobile Devices. In: Proceedings of the 1st Workshop on Virtualization in Mobile Computing (MobiVirt 2008), pp. 31\u201335 (2008)","DOI":"10.1145\/1622103.1629656"},{"key":"9_CR11","unstructured":"Percoco, N., Schulte, S.: Adventures in BouncerLand: Failures of Automated Malware Detection within Mobile Application Markets. In: Black Hat USA 2012 (2012), \n \n http:\/\/media.blackhat.com\/\n \n \n (last visited in February 2014)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H.: Paranoid Android: Versatile Protection for Smartphones. In: Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC 2010), pp. 347\u2013356 (2010)","DOI":"10.1145\/1920261.1920313"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making Middleboxes Someone else\u2019s Problem: Network Processing As a Cloud Service. In: Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp. 13\u201324. ACM (2012)","DOI":"10.1145\/2342356.2342359"}],"container-title":["Lecture Notes in Computer Science","Monitoring and Securing Virtualized Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43862-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T00:24:36Z","timestamp":1558916676000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43862-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662438619","9783662438626"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43862-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}