{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:35:31Z","timestamp":1764239731354},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/tifs.2012.2204249","type":"journal-article","created":{"date-parts":[[2012,6,11]],"date-time":"2012-06-11T18:02:11Z","timestamp":1339437731000},"page":"1426-1438","source":"Crossref","is-referenced-by-count":62,"title":["CR\u00eaPE: A System for Enforcing Fine-Grained Context-Related Policies on Android"],"prefix":"10.1109","volume":"7","author":[{"given":"M.","family":"Conti","sequence":"first","affiliation":[]},{"given":"B.","family":"Crispo","sequence":"additional","affiliation":[]},{"given":"E.","family":"Fernandes","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Zhauniarovich","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2008.02.002"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1330295.1330299"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.25"},{"key":"ref32","author":"gohring","year":"0","journal-title":"(2011 February) VMWare Shows off Mobile Virtualization on Android Internet Article"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2004.1347784"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IMCSIT.2008.4747331"},{"key":"ref37","author":"moses","year":"2005","journal-title":"Extensible Access Control Markup Language (XACML)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.2"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-005-1075-7"},{"key":"ref10","year":"0","journal-title":"OMTP Mobile terminal platform"},{"key":"ref40","first-page":"249","article-title":"Mind how you answer me! (transparently authenticating the user of a smartphone when answering or placing a call)","author":"conti","year":"2011","journal-title":"Proc ASIACCS '10"},{"key":"ref11","author":"dwivedi","year":"2010","journal-title":"Mobile Application Security"},{"key":"ref12","year":"0","journal-title":"Application Certification Requirements For Windows Phone Manual"},{"key":"ref13","year":"0","journal-title":"Windows Phone 7 Security Model Windows Phone 7 Security Model_FINAL_122010 pdf"},{"key":"ref14","year":"0","journal-title":"Nokia Forum Signed MIDlet Developer's Guide MIDP_2_0_Signed_MIDlet_Developers_Guide_v2_0_en pdf"},{"key":"ref15","year":"0","journal-title":"Simbian Signed Internet Webpage"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.36"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.39"},{"key":"ref18","first-page":"326","article-title":"Context-aware usage control for android","author":"bai","year":"2010","journal-title":"Proc SecureComm 2010"},{"key":"ref19","first-page":"328","article-title":"Apex: Extending android permission model and enforcement with user-defined runtime constraints","author":"nauman","year":"2010","journal-title":"Proc ASIACCS '10"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-008-0135-0"},{"key":"ref4","first-page":"18","article-title":"The ponder policy specification language","author":"damianou","year":"2001","journal-title":"Procs of POLICY'01"},{"key":"ref27","first-page":"129","article-title":"Srbac: A spatial role-based access control model for mobile systems","author":"hansen","year":"2003","journal-title":"Proc NORDSEC'03"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2009.26","article-title":"Understanding android security","volume":"7","author":"enck","year":"2009","journal-title":"IEEE Security Privacy"},{"key":"ref6","year":"0","journal-title":"CRePEdroid Project"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ECUMN.2007.19"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2008.10"},{"key":"ref7","first-page":"331","article-title":"CRePE: Context-related policy enforcement for Android","author":"conti","year":"2010","journal-title":"Proc ISC'10"},{"key":"ref2","year":"0","journal-title":"Android Project"},{"key":"ref9","year":"0","journal-title":"Openmoko Project"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1878961.1878982"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"key":"ref45","author":"wallach","year":"0","journal-title":"(2011 February) Things overheard on the Wi-Fi from my Android smartphone Internet Article"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176306"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/2.901174"},{"key":"ref21","article-title":"Taming Information-stealing smartphone applications (on Android)","author":"zhou","year":"2011","journal-title":"Proc TRUST 2011"},{"key":"ref42","year":"0","journal-title":"Internet Webpage"},{"key":"ref24","first-page":"757","article-title":"Context-sensitive access control model and implementation","author":"han","year":"2005","journal-title":"Proc of CIT'05"},{"key":"ref41","first-page":"1","article-title":"Contextdroid: An expression-based context framework for android","author":"van wissen","year":"2010","journal-title":"Proc PhoneSense '10"},{"key":"ref23","year":"0","journal-title":"AndromalyAnomaly Detaction in Android Platform Internet Webpage"},{"key":"ref44","year":"0","journal-title":"Internet Webpage"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1210263.1210265"},{"key":"ref43","year":"0","journal-title":"Internet Webpage"},{"key":"ref25","author":"matthew","year":"2000","journal-title":"Generalized Role-based Access Control for Securing Future Applications"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10206\/6297499\/06215040.pdf?arnumber=6215040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,14]],"date-time":"2017-11-14T09:44:02Z","timestamp":1510652642000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6215040\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":47,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2012.2204249","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,10]]}}}