{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:40:28Z","timestamp":1725838828355},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319260952"},{"type":"electronic","value":"9783319260969"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26096-9_9","type":"book-chapter","created":{"date-parts":[[2015,11,24]],"date-time":"2015-11-24T16:18:35Z","timestamp":1448381915000},"page":"80-90","source":"Crossref","is-referenced-by-count":3,"title":["Mind Your $$(R, \\varPhi )$$ s: Location-Based Privacy Controls for Consumer Drones"],"prefix":"10.1007","author":[{"given":"Tavish","family":"Vaidya","sequence":"first","affiliation":[]},{"given":"Micah","family":"Sherr","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"key":"9_CR1","unstructured":"NOTAM number: FDC 0\/8326. \n                    http:\/\/tfr.faa.gov\/save_pages\/detail_0_8326.html\n                    \n                  . Accessed 4 January 2015"},{"key":"9_CR2","unstructured":"DJI Phantom 2 (2014). \n                    http:\/\/www.dji.com\/product\/phantom-2\/feature\n                    \n                  . Accessed 3 January 2015"},{"key":"9_CR3","unstructured":"Near-collisions between drones, airliners surge, new FAA reports show (2014). \n                    http:\/\/www.washingtonpost.com\/world\/national-security\/near-collisions-between-drones-airliners-surge-new-faa-reports-show\/2014\/11\/26\/9a8c1716-758c-11e4-bd1b-03009bd3e984_story.html\n                    \n                  . Accessed 3 January 2015"},{"key":"9_CR4","unstructured":"HEXO+ (2014). \n                    http:\/\/hexoplus.com\n                    \n                  . Accessed 3 January 2015"},{"key":"9_CR5","unstructured":"IRIS+ (2014). \n                    https:\/\/store.3drobotics.com\/products\/iris\n                    \n                  . Accessed 3 January 2015"},{"key":"9_CR6","unstructured":"No FLY zones (2014). \n                    http:\/\/www.dji.com\/fly-safe\/category-mc\n                    \n                  . Accessed 3 January 2015"},{"key":"9_CR7","unstructured":"Parrot bebop drone (2014). \n                    http:\/\/www.parrot.com\/usa\/products\/bebop-drone\n                    \n                  . Accessed 3 January 2015"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Blumenthal, J., Reichenbach, F., Timmermann, D.: Minimal transmission power vs. signal strength as distance estimation for localization in wireless sensor networks. In: 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, SECON 2006, vol. 3, pp. 761\u2013766, September 2006","DOI":"10.1109\/SAHCN.2006.288558"},{"issue":"5","key":"9_CR9","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/98.878533","volume":"7","author":"N Bulusu","year":"2000","unstructured":"Bulusu, N., Heidemann, J., Estrin, D.: GPS-less low-cost outdoor localization for very small devices. IEEE Pers. Commun. 7(5), 28\u201334 (2000). ISSN 1070\u20139916","journal-title":"IEEE Pers. Commun."},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2011, pp. 15\u201326, New York (2011)","DOI":"10.1145\/2046614.2046619"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Carter, H., Lever, C., Traynor, P.: Whitewash: outsourcing garbled circuit generation for mobile devices (2014)","DOI":"10.1145\/2664243.2664255"},{"key":"9_CR12","unstructured":"Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI 2010, pp. 1\u20136, Berkeley (2010)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Fundulaki, I., Marx, M.: Specifying access control policies for XML documents with XPath. In: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies, SACMAT 2004, pp. 61\u201369, New York (2004)","DOI":"10.1145\/990036.990046"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-642-00975-4_10","volume-title":"Passive and Active Network Measurement","author":"D Han","year":"2009","unstructured":"Han, D., Andersen, D.G., Kaminsky, M., Papagiannaki, K., Seshan, S.: Access point localization using local signal strength gradient. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol. 5448, pp. 99\u2013108. Springer, Heidelberg (2009)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: These aren\u2019t the droids you\u2019re looking for: retrofitting android to protect data from imperious applications. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, pp. 639\u2013652. ACM, New York (2011)","DOI":"10.1145\/2046707.2046780"},{"key":"9_CR16","unstructured":"Jana, S., Molnar, D., Moshchuk, A., Dunn, A., Livshits, B., Wang, H.J., Ofek, E.: Enabling fine-grained permissions for augmented reality applications with recognizers. In: Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13), pp. 415\u2013430, Washington, DC (2013)"},{"key":"9_CR17","unstructured":"Matheus, A., Herrmann, J.: Geospatial extensible access control markup language (GeoXACML). Open Geospatial Consortium Inc., OGC (2008)"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Nauman, M., Khan, S., Zhang, X.: Apex: extending android permission model and enforcement with user-defined runtime constraints. In: Proceedings of the 5th ACM Symposium on Information. Computer and Communications Security, ASIACCS 2010, pp. 328\u2013332, New York (2010)","DOI":"10.1145\/1755688.1755732"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-642-04219-5_5","volume-title":"Secure Data Management","author":"Q Ni","year":"2009","unstructured":"Ni, Q., Xu, S., Bertino, E., Sandhu, R., Han, W.: An access control language for a general provenance model. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2009. LNCS, vol. 5776, pp. 68\u201388. Springer, Heidelberg (2009)"},{"key":"9_CR20","unstructured":"Ribeiro, C., Ribeiro, C., Z\u00faquete, A., Ferreira, P., Guedes, P.: SPL: an access control language for security policies with complex constraints. In: Proceedings of the Network and Distributed System Security Symposium, pp. 89\u2013107 (1999)"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Roesner, F., Kohno, T., Moshchuk, A., Parno, B., Wang, H., Cowan, C.: User-driven access control: rethinking permission granting in modern operating systems. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 224\u2013238, May 2012","DOI":"10.1109\/SP.2012.24"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Roesner, F., Molnar, D., Moshchuk, A., Kohno, T., Wang, H.J.: World-driven access control for continuous sensing. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 1169\u20131181. ACM, New York (2014)","DOI":"10.1145\/2660267.2660319"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Shirley, J., Evans, D.: The user is not the enemy: fighting malware by tracking user intentions. In: Proceedings of the 2008 Workshop on New Security Paradigms, NSPW 2008, pp. 33\u201345, New York (2008)","DOI":"10.1145\/1595676.1595683"},{"issue":"9","key":"9_CR24","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1145\/1151030.1151033","volume":"49","author":"M Stiegler","year":"2006","unstructured":"Stiegler, M., Karp, A.H., Yee, K.-P., Close, T., Miller, M.S.: Polaris: virus-safe computing for windows XP. Commun. ACM 49(9), 83\u201388 (2006)","journal-title":"Commun. ACM"},{"key":"9_CR25","unstructured":"Xu, R., Sa\u00efdi, H., Anderson, R.: Aurasium: practical policy enforcement for android applications. In: Proceedings of the 21st USENIX Conference on Security Symposium, Security 2012, pp. 27\u201327, Berkeley (2012)"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, B., Al-Shaer, E., Jagadeesan, R., Riely, J., Pitcher, C.: Specifications of a high-level conflict-free firewall policy language for multi-domain networks. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, pp. 185\u2013194, New York (2007)","DOI":"10.1145\/1266840.1266871"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26096-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T17:22:48Z","timestamp":1559323368000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26096-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319260952","9783319260969"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26096-9_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}