{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:12:06Z","timestamp":1743091926928,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319269603"},{"type":"electronic","value":"9783319269610"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26961-0_3","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T08:07:52Z","timestamp":1450253272000},"page":"21-35","source":"Crossref","is-referenced-by-count":5,"title":["Extending Mandatory Access Control Policies in Android"],"prefix":"10.1007","author":[{"given":"Stefano","family":"Paraboschi","sequence":"first","affiliation":[]},{"given":"Enrico","family":"Bacis","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Mutti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,31]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Arrigoni Neri, M., Guarnieri, M., Magri, E., Mutti, S., Paraboschi, S.: Conflict detection in security policies using semantic web technology. In: Proceedings of IEEE ESTEL - Security Track (2012)","key":"3_CR1","DOI":"10.1109\/ESTEL.2012.6400092"},{"doi-asserted-by":"crossref","unstructured":"Bacis, E., Mutti, S., Paraboschi, S.: AppPolicyModules: mandatory access control for third-party Apps. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 309\u2013320. ACM (2015)","key":"3_CR2","DOI":"10.1145\/2714576.2714626"},{"doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in Android. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, pp. 239\u2013252. ACM (2011)","key":"3_CR3","DOI":"10.1145\/1999995.2000018"},{"doi-asserted-by":"crossref","unstructured":"Denning, D.E., Akl, S.G., Morgenstern, M., Neumann, P.G., Schell, R.R., Heckman, M.: Views for multilevel database security. In: 1986 IEEE Symposium on Security and Privacy, p. 156. IEEE (1986)","key":"3_CR4","DOI":"10.1109\/SP.1986.10012"},{"doi-asserted-by":"crossref","unstructured":"Guarnieri, M., Arrigoni Neri, M., Magri, E., Mutti, S.: On the notion of redundancy in access control policies. In: Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, pp. 161\u2013172. ACM (2013)","key":"3_CR5","DOI":"10.1145\/2462410.2462426"},{"key":"3_CR6","volume-title":"Effective Oracle Database 10g Security by Design","author":"D Knox","year":"2004","unstructured":"Knox, D.: Effective Oracle Database 10g Security by Design. McGraw-Hill Inc., New York (2004)"},{"doi-asserted-by":"crossref","unstructured":"Lepreau, J., Spencer, R., Smalley, S., Loscocco, P., Hibler, M., Andersen, D.: The flask security architecture: system support for diverse security policies. In: Secure Computing Corp, Saint Paul, MN (2006)","key":"3_CR7","DOI":"10.21236\/ADA443108"},{"doi-asserted-by":"crossref","unstructured":"Mutti, S., Bacis, E., Paraboschi, S.: An SELinux-based Intent manager for Android. In: IEEE Conference on Communications and Network Security, Florence, Italy, September 2015","key":"3_CR8","DOI":"10.1109\/CNS.2015.7346916"},{"doi-asserted-by":"crossref","unstructured":"Mutti, S., Bacis, E., Paraboschi, S.: Policy specialization to support domain isolation. In: SafeConfig 2015: Automated Decision Making for Active Cyber Defense, Denver, Colorado, USA, October 2015","key":"3_CR9","DOI":"10.1145\/2809826.2809832"},{"doi-asserted-by":"crossref","unstructured":"Mutti, S., Bacis, E., Paraboschi, S.: SeSQLite: security enhanced SQLite. In: Annual Computer Security Applications Conference 2015 (ACSAC 2015), Los Angeles, California, USA, December 2015","key":"3_CR10","DOI":"10.1145\/2818000.2818041"},{"unstructured":"Mutti, S., Neri, M.A., Paraboschi, S.: An eclipse plug-in for specifying security policies in modern information systems. In: Proceedings of the Eclipse-IT (2011)","key":"3_CR11"},{"issue":"6","key":"3_CR12","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1002\/sec.360","volume":"5","author":"M Ongtang","year":"2012","unstructured":"Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P.: Semantically rich application-centric security in Android. Secur. Commun. Netw. 5(6), 658\u2013673 (2012)","journal-title":"Secur. Commun. Netw."},{"issue":"6","key":"3_CR13","doi-asserted-by":"publisher","first-page":"10:1","DOI":"10.1147\/JRD.2013.2284403","volume":"57","author":"D Sb\u00eerlea","year":"2013","unstructured":"Sb\u00eerlea, D., Burke, M.G., Guarnieri, S., Pistoia, M., Sarkar, V.: Automatic detection of inter-application permission leaks in Android applications. IBM J. Res. Dev. 57(6), 10:1\u201310:12 (2013)","journal-title":"IBM J. Res. Dev."},{"unstructured":"Schaufler, C.: Smack in embedded computing. In: Proceedings of the Ottawa Linux Symposium (2008)","key":"3_CR14"},{"unstructured":"Smalley, S., Craig, R.: Security Enhanced (SE) Android: bringing flexible MAC to Android. In: Network and Distributed System Security Symposium (NDSS 13) (2013)","key":"3_CR15"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26961-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T19:48:53Z","timestamp":1559332133000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26961-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319269603","9783319269610"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26961-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}