{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:46:05Z","timestamp":1725907565915},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319654812"},{"type":"electronic","value":"9783319654829"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65482-9_34","type":"book-chapter","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T14:08:09Z","timestamp":1502374089000},"page":"476-485","source":"Crossref","is-referenced-by-count":2,"title":["PerRec: A Permission Configuration Recommender System for Mobile Apps"],"prefix":"10.1007","author":[{"given":"Yanxiao","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Zheng","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,11]]},"reference":[{"issue":"5","key":"34_CR1","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1007\/s00779-011-0420-2","volume":"16","author":"Z Yan","year":"2012","unstructured":"Yan, Z., Zhang, P., Deng, R.H.: TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications. Pers. Ubiquit. Comput. 16(5), 485\u2013506 (2012)","journal-title":"Pers. Ubiquit. Comput."},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Dang, T.L., Yan. Z., Tong. F., Zhang. W.D., Zhang. P.: Implementation of a trust-behavior based reputation system for mobile applications. In: 2014 IEEE 9th International Conference on Broadband and Wireless Computing, Communication and Applications, pp. 221\u2013228 (2014)","DOI":"10.1109\/BWCCA.2014.52"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Nauman, M., Khan, S., Zhang, X.: Apex: extending android permission model and enforcement with user_defined run time constraints. In: 5th International Symposium on ACM Symposium on Information, Computer and Communications Security, pp. 328\u2013332 (2010)","DOI":"10.1145\/1755688.1755732"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Jeon, J., Micinski, K.K., Vaughan, J.A., Fogel, A., Reddy, N., et al.: Dr. Android and Mr. Hide: fine_grained permissions in android applications. In: The Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Raleigh, North Carolina, USA, pp. 3\u201314. ACM (2012)","DOI":"10.1145\/2381934.2381938"},{"issue":"2","key":"34_CR5","first-page":"393","volume":"32","author":"W Enck","year":"2010","unstructured":"Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.G., Cox, L.P., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. 32(2), 393\u2013407 (2010)","journal-title":"ACM Trans. Comput. Syst."},{"issue":"6","key":"34_CR6","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.cose.2014.02.007","volume":"43","author":"Z Fang","year":"2014","unstructured":"Fang, Z., Han, W., Li, Y.: Permission based Android security: issues and countermeasures. Comput. Secur. 43(6), 205\u2013218 (2014)","journal-title":"Comput. Secur."},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Rashidi, B., Fung, C., Vu, T.: Dude, ask the experts!: Android resource access permission recommendation with RecDroid. In: IEEE International Symposium on Integrated Network Management (IM), pp. 296\u2013304 (2015)","DOI":"10.1109\/INM.2015.7140304"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Bao, L., Lo, D., Xia, X., Li, S.: What permissions should this Android app request? In: 2016 International Conference on Software Analysis, Testing and Evolution (SATE), Kunming, pp. 36\u201341 (2016)","DOI":"10.1109\/SATE.2016.13"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Hane, A.Y., E, Chin., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: 2012 Eighth Symposium on Usable Privacy and Security(SOUPS 2012), New York, pp. 1\u201314 (2012)","DOI":"10.1145\/2335356.2335360"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Kaur, A., Upadhyay, D.: PeMo: modifying application\u2019s permissions and preventing information stealing on smartphones. In: 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence), Noida, pp. 905\u2013910 (2014)","DOI":"10.1109\/CONFLUENCE.2014.6949282"},{"issue":"11","key":"34_CR11","doi-asserted-by":"crossref","first-page":"1869","DOI":"10.1109\/TIFS.2014.2353996","volume":"9","author":"W Wang","year":"2014","unstructured":"Wang, W., Wang, X., Feng, D., Liu, J., Han, Z., Zhang, X.: Exploring permission-induced risk in Android applications for malicious application detection. IEEE Trans on Information Forensics and Security 9(11), 1869\u20131882 (2014)","journal-title":"IEEE Trans on Information Forensics and Security"},{"key":"34_CR12","doi-asserted-by":"crossref","unstructured":"Wei, X., Gomez, L., Neamtiu, I., Faloutsos, M.: Permission evolution in the android ecosystem. In: ACM Computer Security Applications Conference ACSAC, pp. 31\u201340 (2012)","DOI":"10.1145\/2420950.2420956"},{"issue":"9","key":"34_CR13","doi-asserted-by":"crossref","first-page":"866","DOI":"10.1109\/TSE.2015.2419611","volume":"41","author":"H Bagheri","year":"2015","unstructured":"Bagheri, H., Sadeghi, A., Garcia, J., Malek, S.: COVERT: compositional analysis of Android inter-app permission leakage. IEEE Trans. Software Eng. 41(9), 866\u2013886 (2015)","journal-title":"IEEE Trans. Software Eng."},{"issue":"10","key":"34_CR14","doi-asserted-by":"crossref","first-page":"2227","DOI":"10.1109\/TIFS.2016.2581304","volume":"11","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Yang, M., Gu, G., Chen, H.: Rethinking permission enforcement mechanism on mobile systems. IEEE Trans. Inf. Forensics Secur. 11(10), 2227\u20132240 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"34_CR15","unstructured":"LBESafety Master. http:\/\/dl.pconline.com.cn\/download\/90435.html"},{"issue":"3","key":"34_CR16","doi-asserted-by":"crossref","first-page":"638","DOI":"10.1111\/j.1559-1816.2013.01044.x","volume":"43","author":"Z Yan","year":"2013","unstructured":"Yan, Z., Dong, Y., Niemi, V., Yu, G.L.: Exploring trust of mobile applications based on user behaviors: an empirical study. J. Appl. Soc. Psychol. 43(3), 638\u2013659 (2013)","journal-title":"J. Appl. Soc. Psychol."},{"key":"34_CR17","unstructured":"Feng, S.: Android software security and reverse analysis, 407 pages. Chap. 5 (2013)"},{"key":"34_CR18","unstructured":"https:\/\/forum.xda-developers.com\/xposed\/xposed-installer-versions-changelog-t2714053"},{"key":"34_CR19","unstructured":"http:\/\/mota.baidu.com\/index.php\/page\/industry\/apprank\/use"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65482-9_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T03:31:32Z","timestamp":1569987092000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65482-9_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319654812","9783319654829"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65482-9_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}