{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:43:01Z","timestamp":1762004581615},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2014,5,1]],"date-time":"2014-05-01T00:00:00Z","timestamp":1398902400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/tdsc.2014.2300482","type":"journal-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T17:49:26Z","timestamp":1391190566000},"page":"211-223","source":"Crossref","is-referenced-by-count":37,"title":["MOSES: Supporting and Enforcing Security Profiles on Smartphones"],"prefix":"10.1109","volume":"11","author":[{"given":"Yury","family":"Zhauniarovich","sequence":"first","affiliation":[]},{"given":"Giovanni","family":"Russello","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[]},{"given":"Earlence","family":"Fernandes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"KVM for ARM","author":"dall","year":"2010","journal-title":"Proc Ottawa Linux Symp"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc08.2007.64"},{"key":"ref33","year":"0"},{"key":"ref32","year":"0"},{"key":"ref31","year":"0"},{"key":"ref30","first-page":"27","article-title":"Aurasium: Practical Policy Enforcement for Android Applications","author":"xu","year":"2012","journal-title":"Proc USENIX 21st USENIX Conf Security Symp (Security ?12)"},{"key":"ref37","year":"0"},{"key":"ref36","year":"0"},{"key":"ref35","year":"0"},{"key":"ref34","year":"0"},{"key":"ref28","author":"backes","year":"2012","journal-title":"AppGuard?Real-Time Policy Enforcement for Third-Party Applications"},{"key":"ref27","year":"0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381938"},{"key":"ref2","year":"0"},{"key":"ref1","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2012.14"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2012.50"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/978-3-642-33392-7_9","article-title":"Context-Aware, Data-Driven Policy Enforcement for Smart Mobile Devices in Business Environments","author":"feth","year":"2012","journal-title":"Proc Int?l Conf Security and Privacy in Mobile Information and Comm Systems (MobiSec ?12)"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/978-3-642-16161-2_19","article-title":"Context-Aware Usage Control for Android","author":"bai","year":"2010","journal-title":"Proc Int?l Conf Security and Privacy in Comm Networks (SecureComm ?10)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133629"},{"key":"ref26","article-title":"Security Enhanced (SE) Android: Bringing flexible MAC to Android","author":"smalley","year":"2013","journal-title":"Proc Network and Distributed System Security Symp (NDSS ?13)"},{"key":"ref25","article-title":"Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies","author":"bugiel","year":"2013","journal-title":"Proc 22nd USENIX Conf Security (Security ?13)"},{"key":"ref50","year":"0"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.25"},{"key":"ref55","year":"0"},{"key":"ref54","year":"0"},{"key":"ref53","year":"0"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382304"},{"key":"ref10","year":"0"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2009.26","article-title":"Understanding Android Security","volume":"7","author":"enck","year":"2009","journal-title":"IEEE Security and Privacy"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1899928.1899945"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.2"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1145\/1755688.1755732","article-title":"Apex: Extending Android Permission Model and Enforcement with User-Defined Runtime Constraints","author":"nauman","year":"2010","journal-title":"Proc Fifth ACM Symp Information Computer and Comm Security (ASIACCS ?10)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.39"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2204249"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/978-3-642-21599-5_7","article-title":"Taming Information-Stealing Smartphone Applications (on Android)","author":"zhou","year":"2011","journal-title":"Proc Fourth Int?l Conf Trust and Trustworthy Computing (TRUST ?11)"},{"key":"ref18","first-page":"639","article-title":"These Aren?t the Droids You?re Looking for?: Retroffiting Android to Protect Data from Imperious Applications","author":"hornyack","year":"2011","journal-title":"Proc 18th ACM Conf Computer and Comm Security (CCS ?11)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.151"},{"key":"ref4","first-page":"1","article-title":"Taintdroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones","author":"enck","year":"2010","journal-title":"Proc Ninth USENIX Conf Operating Systems Design and Implementation (OSDI '10)"},{"key":"ref3","year":"0"},{"key":"ref6","article-title":"Performance Evaluation of Para-Virtualization on Modern Mobile Phone Platform","author":"xu","year":"2010","journal-title":"Proc Int?l Conf Computer Electrical and Systems Science and Eng (ICCESSE ?10)"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/978-3-642-30921-2_17","article-title":"AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale","author":"gibler","year":"2012","journal-title":"Proc Fifth Int?l Conf Trust and Trustworthy Computing (TRUST ?12)"},{"key":"ref8","year":"0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046623"},{"key":"ref49","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043574"},{"key":"ref46","year":"0"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295140"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2090316.2090322"},{"key":"ref47","first-page":"1","article-title":"ContextDroid: An Expression-Based Context Framework for Android","author":"wissen","year":"2010","journal-title":"Proc PhoneSense ?10"},{"key":"ref42","year":"0"},{"key":"ref41","year":"0"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046624"},{"key":"ref43","first-page":"297","article-title":"Enforcing Security Policies in Mobile Devices Using Multiple Personas","author":"gupta","year":"2010","journal-title":"Proc Seventh Int?l ICST Conf Mobile and Ubiquitous Systems Computing Networking and Services (MobiQuitous)"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/6813632\/06714498.pdf?arnumber=6714498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:54:19Z","timestamp":1642006459000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6714498\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":55,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2014.2300482","relation":{},"ISSN":["1545-5971"],"issn-type":[{"value":"1545-5971","type":"print"}],"subject":[],"published":{"date-parts":[[2014,5]]}}}