{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:08:52Z","timestamp":1725480532484},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/ares.2009.57","type":"proceedings-article","created":{"date-parts":[[2009,6,10]],"date-time":"2009-06-10T15:05:58Z","timestamp":1244646358000},"page":"322-328","source":"Crossref","is-referenced-by-count":0,"title":["MixVM - An Approach to Service Isolation and Data Protection in Mobile Context-Sensitive Applications"],"prefix":"10.1109","author":[{"given":"Thomas","family":"Butter","sequence":"first","affiliation":[]},{"given":"Markus","family":"Aleksy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/2.587552"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/4236.735984"},{"article-title":"dynamic mobile anonymity with mixing","year":"2006","author":"tatli","key":"14"},{"journal-title":"The Java(tm) Virtual Machine Specification - Second Edition","year":"1999","author":"lindholm","key":"11"},{"year":"0","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/353171.353195"},{"journal-title":"Model checking","year":"1999","author":"clarke","key":"2"},{"journal-title":"Wissenschaftliches Arbeitspapier","article-title":"user requirements for location-based services-an analysis on the basis of literature","year":"2005","author":"bauer","key":"1"},{"journal-title":"Proceedings of 4th International Network Conference (INC2004)","article-title":"a location-aware prefetching mechanism","year":"2004","author":"kirchner","key":"10"},{"journal-title":"Proceedings of the USENIX Symposium on Internet Technologies and Systems","article-title":"going beyond the sandbox: an overview of the new security architecture in the java development kit 1.2","year":"1997","author":"gong","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1002\/smj.4250160919"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945464"},{"article-title":"jeagle: a java runtime verification tool","year":"2004","author":"d'amorim","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-002-0214-7"},{"journal-title":"The Unified Software Development Process","year":"1999","author":"jacobson","key":"8"}],"event":{"name":"2009 International Conference on Availability, Reliability and Security","start":{"date-parts":[[2009,3,16]]},"location":"Fukuoka, Japan","end":{"date-parts":[[2009,3,19]]}},"container-title":["2009 International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5066393\/5066394\/05066489.pdf?arnumber=5066489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T17:26:18Z","timestamp":1489771578000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5066489\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ares.2009.57","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}