{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:15:00Z","timestamp":1760044500949},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642302435"},{"type":"electronic","value":"9783642302442"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30244-2_4","type":"book-chapter","created":{"date-parts":[[2012,4,28]],"date-time":"2012-04-28T12:55:50Z","timestamp":1335617750000},"page":"40-51","source":"Crossref","is-referenced-by-count":12,"title":["Android Security Permissions \u2013 Can We Trust Them?"],"prefix":"10.1007","author":[{"given":"Clemens","family":"Orthacker","sequence":"first","affiliation":[]},{"given":"Peter","family":"Teufl","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Kraxberger","sequence":"additional","affiliation":[]},{"given":"G\u00fcnther","family":"Lackner","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Gissing","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Marsalek","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Leibetseder","sequence":"additional","affiliation":[]},{"given":"Oliver","family":"Prevenhueber","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2009.26","volume":"7","author":"W. Enck","year":"2009","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: Understanding Android Security. IEEE Security and Privacy\u00a07, 50\u201357 (2009)","journal-title":"IEEE Security and Privacy"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Nauman, M., Khan, S., Zhang, X.: Apex: extending Android permission model and enforcement with user-defined runtime constraints. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 328\u2013332. ACM (2010)","DOI":"10.1145\/1755688.1755732"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P.: Semantically Rich Application-Centric Security in Android. In: 2009 Annual Computer Security Applications Conference, pp. 340\u2013349 (December 2009)","DOI":"10.1109\/ACSAC.2009.39"},{"issue":"2","key":"4_CR4","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MSP.2010.2","volume":"8","author":"A. Shabtai","year":"2010","unstructured":"Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google Android: A Comprehensive Security Assessment. IEEE Security & Privacy Magazine\u00a08(2), 35\u201344 (2010)","journal-title":"IEEE Security & Privacy Magazine"},{"issue":"2","key":"4_CR5","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MPRV.2009.39","volume":"8","author":"A. Toninelli","year":"2009","unstructured":"Toninelli, A., Montanari, R., Lassila, O., Khushraj, D.: What\u2019s on Users\u2019 Minds? Toward a Usable Smart Phone Security Model. IEEE Pervasive Computing\u00a08(2), 32\u201339 (2009)","journal-title":"IEEE Pervasive Computing"},{"key":"4_CR6","unstructured":"Vennon, T., Stroop, D.: Android Market: Threat Analysis of the Android Market (2010)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Mobile Information and Communication Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30244-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T01:28:59Z","timestamp":1556760539000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30244-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642302435","9783642302442"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30244-2_4","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}