{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:28:58Z","timestamp":1725902938052},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_42","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T08:02:27Z","timestamp":1499155347000},"page":"445-454","source":"Crossref","is-referenced-by-count":0,"title":["Self-aware Access Control System for Android"],"prefix":"10.1007","author":[{"given":"Nanda Kumar","family":"Thanigaivelan","sequence":"first","affiliation":[]},{"given":"Ethiopia","family":"Nigussie","sequence":"additional","affiliation":[]},{"given":"Seppo","family":"Virtanen","sequence":"additional","affiliation":[]},{"given":"Jouni","family":"Isoaho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"42_CR1","doi-asserted-by":"crossref","unstructured":"Ericsson: Ericsson Mobility Report, November 2016. https:\/\/www.ericsson.com\/assets\/local\/mobility-report\/documents\/2016\/ericsson-mobility-report-november-2016.pdf","DOI":"10.17016\/2573-2129.17"},{"key":"42_CR2","unstructured":"Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R.: XManDroid: a new android evolution to mitigate privilege escalation attacks. Technical report TR-2011-04, Technische Universit\u00e4t Darmstadt (2011)"},{"issue":"2","key":"42_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (TOCS) 32(2), 1\u201329 (2014). Article No.5","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"42_CR4","unstructured":"Heuser, S., Nadkarni, A., Enck, W., Sadeghi, A.-R.: ASM: a programmable interface for extending android security. In: Proceedings of 23rd USENIX Security Symposium (2014)"},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Wang, X., Sun, K., Wang, Y., Jing, J.: DeepDroid: dynamically enforcing enterprise policy on android devices. In: Proceedings of 22nd Annual Network and Distributed System Security Symposium, NDSS 2015. The Internet Society (2015)","DOI":"10.14722\/ndss.2015.23263"},{"issue":"5","key":"42_CR6","doi-asserted-by":"crossref","first-page":"1426","DOI":"10.1109\/TIFS.2012.2204249","volume":"7","author":"M Conti","year":"2012","unstructured":"Conti, M., Crispo, B., Fernandes, E., Zhauniarovich, Y.: CR\u00eaPE: a system for enforcing fine-grained context-related policies on android. IEEE Trans. Inf. Forensics Secur. 7(5), 1426\u20131438 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., Shelby, Z., Gomez, C.: RFC 7668 - IPv6 over BLUETOOTH\u00ae low energy. In: IETF (2015)","DOI":"10.17487\/RFC7668"},{"key":"42_CR8","unstructured":"Wang, H., Xi, M., Liu, J., Chen, C.: Transmitting IPv6 packets over Bluetooth low energy based on BlueZ. In: 2013 15th International Conference on Advanced Communications Technology (ICACT), PyeongChang, pp. 72\u201377 (2013)"},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Andersen, M.P., Fierro, G., Culler, D.E.: System design for a synergistic, low power Mote\/BLE embedded platform. In: 2016 15th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN), Vienna, pp. 1\u201312 (2016)","DOI":"10.1109\/IPSN.2016.7460722"},{"key":"42_CR10","doi-asserted-by":"crossref","unstructured":"Angelopoulos, C.M., Evangelatos, O., Nikoletseas, S., Raptis, T.P., Rolim, J.D.P., Veroutis, K.: A user-enabled testbed architecture with mobile crowdsensing support for smart, green buildings. In: 2015 IEEE International Conference on Communications (ICC), London, pp. 573\u2013578 (2015)","DOI":"10.1109\/ICC.2015.7248383"},{"issue":"4","key":"42_CR11","doi-asserted-by":"crossref","first-page":"3319","DOI":"10.1109\/TVT.2016.2587722","volume":"64","author":"D Zhao","year":"2017","unstructured":"Zhao, D., Ma, H., Liu, L.: Frugal online incentive mechanisms for mobile crowd sensing. IEEE Trans. Veh. Technol. 64(4), 3319\u20133330 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"Shu, L., Chen, Y., Huo, Z., Bergmann, N., Wang L.: When mobile crowd sensing meets traditional industry. IEEE Access (2017)","DOI":"10.1109\/ACCESS.2017.2657820"},{"key":"42_CR13","doi-asserted-by":"crossref","unstructured":"Han, J., Owusu, E., Nguyen, L.T., Perrig, A., Zhang, J.: Accomplice: location inference using accelerometers on smartphones. In: 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS), pp. 1\u20139. IEEE (2012)","DOI":"10.1109\/COMSNETS.2012.6151305"},{"key":"42_CR14","doi-asserted-by":"crossref","unstructured":"Narain, S., Vo-Huu, T.D., Block, K., Noubir, G.: Inferring user routes and locations using zero-permission mobile sensors. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 397\u2013413. IEEE (2016)","DOI":"10.1109\/SP.2016.31"},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Nawaz, S., Mascolo, C.: Mining users\u2019 significant driving routes with low-power sensors. In: 2014 Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, pp. 236\u2013250. ACM (2014)","DOI":"10.1145\/2668332.2668348"},{"key":"42_CR16","doi-asserted-by":"crossref","unstructured":"Zhou, X., Demetriou, S., He, D., Naveed, M., Pan, X., Wang, X., Gunter, C.A., Nahrstedt, K.: Identity, location, disease and more: inferring your secrets from android public resources. In: 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 1017\u20131028. ACM (2013)","DOI":"10.1145\/2508859.2516661"},{"issue":"11","key":"42_CR17","doi-asserted-by":"crossref","first-page":"4566","DOI":"10.1109\/JSEN.2016.2545708","volume":"16","author":"A Wang","year":"2016","unstructured":"Wang, A., Chen, G., Yang, J., Zhao, S., Chang, C.-Y.: A comparative study on human activity recognition using inertial sensors in a smartphone. IEEE Sens. J. 16(11), 4566\u20134578 (2016)","journal-title":"IEEE Sens. J."},{"issue":"2","key":"42_CR18","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1145\/1964897.1964918","volume":"12","author":"JR Kwapisz","year":"2011","unstructured":"Kwapisz, J.R., Weiss, G.M., Moore, S.A.: Activity recognition using cell phone accelerometers. ACM SigKDD Explor. Newsl. 12(2), 74\u201382 (2011)","journal-title":"ACM SigKDD Explor. Newsl."},{"key":"42_CR19","doi-asserted-by":"crossref","unstructured":"Xu, Z., Bai, K., Zhu, S.: TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors. In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, pp. 113\u2013124. ACM (2012)","DOI":"10.1145\/2185448.2185465"},{"key":"42_CR20","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 95\u2013109. IEEE (2012)","DOI":"10.1109\/SP.2012.16"},{"key":"42_CR21","doi-asserted-by":"crossref","unstructured":"Sarma, B.P., Li, N., Gates, C., Potharaju, R., Nita-Rotaru, C., Molloy, I.: Android permissions: a perspective combining risks and benefits. In: Proceedings of the 17th ACM symposium on Access Control Models and Technologies, pp. 13\u201322. ACM (2012)","DOI":"10.1145\/2295136.2295141"},{"key":"42_CR22","unstructured":"Android Developers: Requesting permissions - Android Developers. http:\/\/developer.android.com\/reference\/android\/Manifest.permission.html"},{"key":"42_CR23","unstructured":"Android Developers: Android developers-mainfest.permission. https:\/\/developer.android.com\/guide\/topics\/permissions\/requesting.html"},{"key":"42_CR24","unstructured":"Android Developers: Permission - Android Developers. https:\/\/developer.android.com\/guide\/topics\/manifest\/permission-element.html"},{"key":"42_CR25","unstructured":"Google Developers: The Google maps Geolocation API \u2013 Google Developers. https:\/\/developers.google.com\/maps\/documentation\/geolocation\/intro"},{"key":"42_CR26","unstructured":"Android Developers: Context - Android Developers. https:\/\/developer.android.com\/reference\/android\/content\/Context.html"},{"key":"42_CR27","unstructured":"Android Developers: Activity|Android Developers. https:\/\/developer.android.com\/reference\/android\/app\/Activity.html"},{"issue":"2","key":"42_CR28","first-page":"1","volume":"9","author":"L Guang","year":"2010","unstructured":"Guang, L., Nigussie, E., Rantala, P., Isoaho, J., Tenhunen, H.: Hierarchical agent monitoring design approach towards self-aware parallel systems-on-chip. ACM Trans. Embed. Comput. Syst. (TECS) 9(2), 1\u201326 (2010)","journal-title":"ACM Trans. Embed. Comput. Syst. (TECS)"},{"key":"42_CR29","doi-asserted-by":"crossref","unstructured":"Isoaho, J., Virtanen, S., Tenhunen, H.: Current challenges in embedded communication systems. In: Innovations in Embedded and Real-Time Systems Engineering for Communication, pp. 1\u201321. IGI Global (2012)","DOI":"10.4018\/978-1-4666-0912-9.ch001"},{"key":"42_CR30","doi-asserted-by":"crossref","unstructured":"Weyns, D., Malek, S., Andersson, J.: FORMS: unifying reference model for formal specification of distributed self-adaptive systems. ACM Trans. Autonom. Adapt. Syst. 7(1), 61 p. (2012). Article 8","DOI":"10.1145\/2168260.2168268"},{"issue":"2","key":"42_CR31","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MWC.2016.7462489","volume":"23","author":"F Chiti","year":"2016","unstructured":"Chiti, F., Fantacci, R., Loreti, M., Pugliese, R.: Context-aware wireless mobile autonomic computing and communications: research trends and emerging applications. IEEE Wirel. Commun. 23(2), 86\u201392 (2016)","journal-title":"IEEE Wirel. Commun."},{"key":"42_CR32","unstructured":"Covington, M.J., Moyer, M.J., Ahamad, M.: Generalized role-based access control for securing future applications (2000)"},{"key":"42_CR33","doi-asserted-by":"crossref","unstructured":"Wang, L., Wijesekera, D., Jajodia, S.: A logic-based framework for attribute based access control. In: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, pp. 45\u201355. ACM (2004)","DOI":"10.1145\/1029133.1029140"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T08:39:55Z","timestamp":1692866395000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_42","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}