{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T14:40:06Z","timestamp":1746369606983,"version":"3.40.4"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319118505"},{"type":"electronic","value":"9783319118512"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11851-2_7","type":"book-chapter","created":{"date-parts":[[2014,9,6]],"date-time":"2014-09-06T10:55:22Z","timestamp":1410000922000},"page":"97-112","source":"Crossref","is-referenced-by-count":3,"title":["Stateful Usage Control for Android Mobile Devices"],"prefix":"10.1007","author":[{"given":"Aliaksandr","family":"Lazouski","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Mori","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Saracino","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J. Park","year":"2004","unstructured":"Park, J., Sandhu, R.: The UCON ABC usage control model. ACM Transactions on Information and System Security\u00a07, 128\u2013174 (2004)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"12","key":"7_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(12)70111-3","volume":"2012","author":"B. Morrow","year":"2012","unstructured":"Morrow, B.: BYOD security challenges: control and protect your most sensitive data. Network Security\u00a02012(12), 5\u20138 (2012)","journal-title":"Network Security"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.cose.2009.07.005","volume":"29","author":"G. Costa","year":"2010","unstructured":"Costa, G., Martinelli, F., Mori, P., Schaefer, C., Walter, T.: Runtime monitoring for next generation java me platform. Computers & Security\u00a029, 74\u201387 (2010)","journal-title":"Computers & Security"},{"key":"7_CR4","unstructured":"Aktug, I., Naliuka, K.: ConSpec: A formal language for policy specification. In: Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems (REM 2007), ESORICS, pp. 107\u2013109 (2007)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1007\/978-3-642-40203-6_43","volume-title":"Computer Security \u2013 ESORICS 2013","author":"L. Jia","year":"2013","unstructured":"Jia, L., Aljuraidan, J., Fragkaki, E., Bauer, L., Stroucken, M., Fukushima, K., Kiyomoto, S., Miyake, Y.: Run-time enforcement of information-flow properties on android. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol.\u00a08134, pp. 775\u2013792. Springer, Heidelberg (2013)"},{"issue":"5","key":"7_CR6","doi-asserted-by":"publisher","first-page":"1426","DOI":"10.1109\/TIFS.2012.2204249","volume":"7","author":"M. Conti","year":"2012","unstructured":"Conti, M., Crispo, B., Fernandes, E., Zhauniarovich, Y.: Cr\u00eape: A system for enforcing fine-grained context-related policies on android. IEEE Transactions on Information Forensics and Security\u00a07(5), 1426\u20131438 (2012)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/978-3-642-18178-8_29","volume-title":"Information Security","author":"M. Conti","year":"2011","unstructured":"Conti, M., Nguyen, V.T.N., Crispo, B.: CRePE: Context-related policy enforcement for android. In: Burmester, M., Tsudik, G., Magliveras, S., Ili\u0107, I. (eds.) ISC 2010. LNCS, vol.\u00a06531, pp. 331\u2013345. Springer, Heidelberg (2011)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On Lightweight Mobile Phone Application Certification. In: ACM (ed.) 16th ACM conference on Computer and Communications Security (CCS 2009), pp. 235\u2013254 (2009)","DOI":"10.1145\/1653662.1653691"},{"issue":"3","key":"7_CR9","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/2494522","volume":"57","author":"W. Enck","year":"2014","unstructured":"Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: An information flow tracking system for real-time privacy monitoring on smartphones. Commun. ACM\u00a057(3), 99\u2013106 (2014)","journal-title":"Commun. ACM"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-642-21599-5_7","volume-title":"Trust and Trustworthy Computing","author":"Y. Zhou","year":"2011","unstructured":"Zhou, Y., Zhang, X., Jiang, X., Freeh, V.W.: Taming information-stealing smartphone applications (on android). In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol.\u00a06740, pp. 93\u2013107. Springer, Heidelberg (2011)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Bugiel, S., Davi, L., Dmitrienko, A., Heuser, S., Sadeghi, A.R., Shastry, B.: Practical and Lightweight Domain Isolation on Android. In: ACM (ed.) ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2011), pp. 51\u201361 (2011)","DOI":"10.1145\/2046614.2046624"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Cerbo, F.D., Trabelsi, S., Steingruber, T., Dodero, G., Bezzi, M.: Sticky policies for mobile devices. In: The 18th ACM Symposium on Acces Control Model and Technologies (SACMAT 2013), pp. 257\u2013260 (2013)","DOI":"10.1145\/2462410.2462429"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Trabelsi, S., Sendor, J., Reinicke, S.: Ppl: Primelife privacy policy engine. In: 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, pp. 184\u2013185. IEEE Computer Society (2011)","DOI":"10.1109\/POLICY.2011.24"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Colombo, M., Lazouski, A., Martinelli, F., Mori, P.: A proposal on enhancing XACML with continuous usage control features. In: Proceedings of CoreGRID ERCIM Working Group Workshop on Grids, P2P and Services Computing, pp. 133\u2013146. Springer US (2010)","DOI":"10.1007\/978-1-4419-6794-7_11"},{"key":"7_CR15","unstructured":"Trusted Computing Group: Tpm 2.0 mobile reference architecture (draft) (April 2014)"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-642-21599-5_8","volume-title":"Trust and Trustworthy Computing","author":"I. Bente","year":"2011","unstructured":"Bente, I., Dreo, G., Hellmann, B., Heuser, S., Vieweg, J., von Helden, J., Westhuis, J.: Towards permission-based attestation for the android platform. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol.\u00a06740, pp. 108\u2013115. Springer, Heidelberg (2011)"},{"issue":"4","key":"7_CR17","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1145\/1108906.1108908","volume":"8","author":"X. Zhang","year":"2005","unstructured":"Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal model and policy specification of usage control. ACM Transactions on Information and System Security\u00a08(4), 351\u2013387 (2005)","journal-title":"ACM Transactions on Information and System Security"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, X., Nakae, M., Covington, M.J., Sandhu, R.: Toward a usage-based security framework for collaborative computing systems. ACM Transactions on Information and System Security\u00a011(11), 3:1\u20133:36 (2008)","DOI":"10.1145\/1330295.1330298"},{"issue":"2","key":"7_CR19","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.cosrev.2010.02.002","volume":"4","author":"A. Lazouski","year":"2010","unstructured":"Lazouski, A., Martinelli, F., Mori, P.: Usage control in computer security: A survey. Computer Science Review\u00a04(2), 81\u201399 (2010)","journal-title":"Computer Science Review"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Lazouski, A., Mancini, G., Martinelli, F., Mori, P.: Architecture, worflows, and prototype for stateful data usage control in cloud. In: 2014 IEEE Security and Privacy Workshop, pp. 23\u201330. IEEE Computer Society (2014)","DOI":"10.1109\/SPW.2014.13"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11851-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T14:17:31Z","timestamp":1746368251000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11851-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319118505","9783319118512"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11851-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}