{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,26]],"date-time":"2026-04-26T07:12:08Z","timestamp":1777187528252,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642181771","type":"print"},{"value":"9783642181788","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-18178-8_29","type":"book-chapter","created":{"date-parts":[[2011,1,15]],"date-time":"2011-01-15T16:09:47Z","timestamp":1295107787000},"page":"331-345","source":"Crossref","is-referenced-by-count":81,"title":["CRePE: Context-Related Policy Enforcement for Android"],"prefix":"10.1007","author":[{"given":"Mauro","family":"Conti","sequence":"first","affiliation":[]},{"given":"Vu Thien Nga","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","unstructured":"Android-Developers. Android dev phones, http:\/\/developer.android.com\/guide\/developing\/device.html (retrieved June 30, 2010)"},{"key":"29_CR2","unstructured":"Android Project. Android, http:\/\/www.android.com (retrieved June 30, 2010)"},{"key":"29_CR3","unstructured":"Andromaly Project. Andromaly anomaly detaction in android platform. http:\/\/andromaly.wordpress.com\/ (retrieved June 30, 2010)"},{"key":"29_CR4","unstructured":"Becher, M., Hund, R.: Kernel-level interception and applications on windows mobile devices. Technical Report TR-2008-003, Department for Mathematics and Computer Science, University of Mannheim, Germany (2008)"},{"key":"29_CR5","volume-title":"Core Security Patterns: Best Practices and Stategies for J2EE, Web Services, and Identity Management","author":"R.C. Steel","year":"2005","unstructured":"Steel, R.C., Nagappan, R.: Core Security Patterns: Best Practices and Stategies for J2EE, Web Services, and Identity Management. Prentice Hall, Englewood Cliffs (2005)"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Damiani, M.L., Bertino, E., Catania, B., Perlasca, P.: Geo-rbac: A spatially aware rbac. ACM Trans. Inf. Syst. Secur. 10(1) (2007)","DOI":"10.1145\/1210263.1210265"},{"issue":"4","key":"29_CR7","first-page":"393","volume":"89","author":"M.T. Dashti","year":"2009","unstructured":"Dashti, M.T., Nair, S.K., Jonker, H.: Nuovo DRM paradiso: Designing a secure, verified, fair exchange drm scheme. Fundam. Inf.\u00a089(4), 393\u2013417 (2009)","journal-title":"Fundam. Inf."},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Desmet, L., Joosen, W., Massacci, F., Naliuka, K., Philippaerts, P., Piessens, F., Vanoverberghe, D.: A flexible security architecture to support third-party applications on mobile devices. In: CSAW 2007, pp. 19\u201328 (2007)","DOI":"10.1145\/1314466.1314470"},{"issue":"2","key":"29_CR9","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1109\/2.901174","volume":"34","author":"G.M. Djuknic","year":"2001","unstructured":"Djuknic, G.M., Richton, R.E.: Geolocation and assisted gps. Computer\u00a034(2), 123\u2013125 (2001)","journal-title":"Computer"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: CCS 2009, pp. 235\u2013245 (2009)","DOI":"10.1145\/1653662.1653691"},{"issue":"1","key":"29_CR11","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2009.26","volume":"7","author":"W. Enck","year":"2009","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: Understanding android security. IEEE Security and Privacy\u00a07(1), 50\u201357 (2009)","journal-title":"IEEE Security and Privacy"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Han, W., Zhang, J., Yao, X.: Context-sensitive access control model and implementation. In: CIT 2005, pp. 757\u2013763 (2005)","DOI":"10.1109\/CIT.2005.92"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Ion, I., Dragovic, B., Crispo, B.: Extending the java virtual machine to enforce fine-grained security policies in mobile devices. In: Choi, L., Paek, Y., Cho, S. (eds.) ACSAC 2007. LNCS, vol.\u00a04697, pp. 233\u2013242. Springer, Heidelberg (2007)","DOI":"10.1109\/ACSAC.2007.36"},{"key":"29_CR14","unstructured":"Jansen, W., Karygiannis, T., Iorga, M., Gravila, S., Korolev, V.: Security policy management for handheld devices. In: SAM 2003, pp. 199\u2013204 (2003)"},{"key":"29_CR15","unstructured":"Joshi, A.: Providing security and privacy through context and policy driven device control. In: W3C Workshop on Security for Access to Device APIs from the Web (2008)"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Nair, S.K., Tanenbaum, A.S., Gheorghe, G., Crispo, B.: Enforcing DRM policies across applications. In: DRM 2008, pp. 87\u201394 (2008)","DOI":"10.1145\/1456520.1456535"},{"key":"29_CR17","unstructured":"Nokia Forum. Signed MIDlet Developer\u2019s Guide, http:\/\/www.forum.nokia.com (retrieved June 30, 2010)"},{"key":"29_CR18","unstructured":"OMTP Project. OMTP: Open mobile terminal platform, http:\/\/www.omtp.org (retrieved June 30, 2010)"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P.: Semantically rich application-centric security in android. In: ACSAC 2009, pp. 73\u201382 (2009)","DOI":"10.1109\/ACSAC.2009.39"},{"key":"29_CR20","unstructured":"Openmoko Project. Openmoko, http:\/\/www.openmoko.org (retrieved June 30, 2010)"},{"key":"29_CR21","unstructured":"S3MS. Security of Software and Services for Mobile Systems, http:\/\/www.s3ms.org (retrieved June 30, 2010)"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Sampemane, G., Naldurg, P., Campbell, R.H.: Access control for active spaces. In: ACSAC 2002, p. 343 (2002)","DOI":"10.1109\/CSAC.2002.1176306"},{"key":"29_CR23","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MSP.2010.2","volume":"8","author":"A. Shabtai","year":"2010","unstructured":"Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google android: A comprehensive security assessment. IEEE Security and Privacy\u00a08, 35\u201344 (2010)","journal-title":"IEEE Security and Privacy"},{"key":"29_CR24","unstructured":"Symbian Ltd. Simbian Signed, https:\/\/www.symbiansigned.com (retrieved June 30, 2010)"},{"key":"29_CR25","doi-asserted-by":"crossref","unstructured":"Vachharajani, N., Bridges, M., Chang, J., Rangan, R., Ottoni, G., Blome, J., Reis, G., Vachharajani, M., August, D.: Rifle: An architectural framework for user-centri information-flow security. In: MICRO 2004, pp. 243\u2013254 (2004)","DOI":"10.1109\/MICRO.2004.31"},{"key":"29_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, X., Acii\u00e7mez, O., Seifert, J.-P.: A trusted mobile phone reference architecturevia secure kernel. In: STC 2007, pp. 7\u201314 (2007)","DOI":"10.1145\/1314354.1314359"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-18178-8_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T20:58:05Z","timestamp":1740862685000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-18178-8_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642181771","9783642181788"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-18178-8_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}