{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:23Z","timestamp":1750307483846,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,4]],"date-time":"2010-10-04T00:00:00Z","timestamp":1286150400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,4]]},"DOI":"10.1145\/1866307.1866333","type":"proceedings-article","created":{"date-parts":[[2010,10,5]],"date-time":"2010-10-05T14:38:23Z","timestamp":1286289503000},"page":"224-236","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A control point for reducing root abuse of file-system privileges"],"prefix":"10.1145","author":[{"given":"Glenn","family":"Wurster","sequence":"first","affiliation":[{"name":"Carleton University, Ottawa, ON, Canada"}]},{"given":"Paul C.","family":"van Oorschot","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2010,10,4]]},"reference":[{"volume-title":"Web site (viewed","year":"2009","key":"e_1_3_2_1_1_1","unstructured":"}}Android developers. Web site (viewed 18 Nov 2009 ). http:\/\/developer.android.com. }}Android developers. Web site (viewed 18 Nov 2009). http:\/\/developer.android.com."},{"key":"e_1_3_2_1_2_1","unstructured":"}}Apple Inc. iPhone developer program license agreement Jun 2008.  }}Apple Inc. iPhone developer program license agreement Jun 2008."},{"key":"e_1_3_2_1_3_1","volume-title":"Jan","author":"}}Apple Inc.","year":"2010","unstructured":"}}Apple Inc. iPhone Application Programming Guide , Jan 2010 . http:\/\/developer.apple.com\/iphone\/library\/documentation\/ iPhone\/Conceptual\/iPhoneOSProgrammingGuide\/iPhoneAppProgrammingGuide.pdf. }}Apple Inc. iPhone Application Programming Guide, Jan 2010. http:\/\/developer.apple.com\/iphone\/library\/documentation\/ iPhone\/Conceptual\/iPhoneOSProgrammingGuide\/iPhoneAppProgrammingGuide.pdf."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.25"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_6_1","volume-title":"Linux Journal, number 148, page 13.","author":"Bauer M.","year":"2006","unstructured":"}} M. Bauer . Paranoid penguin: an introduction to Novell AppArmor . In Linux Journal, number 148, page 13. Aug 2006 . }}M. Bauer. Paranoid penguin: an introduction to Novell AppArmor. In Linux Journal, number 148, page 13. Aug 2006."},{"key":"e_1_3_2_1_7_1","volume-title":"USENIX HotSec","author":"Bellissimo A.","year":"2006","unstructured":"}} A. Bellissimo , J. Burgess , and K. Fu . Secure software updates: Disappointments and new challenges . In USENIX HotSec 2006 . }}A. Bellissimo, J. Burgess, and K. Fu. Secure software updates: Disappointments and new challenges. In USENIX HotSec 2006."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455821"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455841"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653729"},{"key":"e_1_3_2_1_12_1","volume-title":"Mailing List Posting","author":"Coker R.","year":"2008","unstructured":"}} R. Coker . Re : {dse-dev} refpolicy: domains need access to the apt's pty and fifos . Mailing List Posting , Mar 2008 . http:\/\/www.nsa.gov\/research\/selinux\/list- archive\/0803\/25307.shtml. }}R. Coker. Re: {dse-dev} refpolicy: domains need access to the apt's pty and fifos. Mailing List Posting, Mar 2008. http:\/\/www.nsa.gov\/research\/selinux\/list- archive\/0803\/25307.shtml."},{"key":"e_1_3_2_1_13_1","volume-title":"Web Page","author":"Collake J.","year":"2007","unstructured":"}} J. Collake . Hacking Windows file protection . Web Page , 2007 . http:\/\/www.bitsum.com\/aboutwfp.asp. }}J. Collake. Hacking Windows file protection. Web Page, 2007. http:\/\/www.bitsum.com\/aboutwfp.asp."},{"key":"e_1_3_2_1_14_1","volume-title":"UNIX System Security: A Guide for Users and System Administrators","author":"Curry D. A.","year":"1992","unstructured":"}} D. A. Curry . UNIX System Security: A Guide for Users and System Administrators . Addison-Wesley , 1992 . }}D. A. Curry. UNIX System Security: A Guide for Users and System Administrators. Addison-Wesley, 1992."},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. USENIX HotOS","author":"DeTreville J.","year":"2005","unstructured":"}} J. DeTreville . Making system configuration more declarative . In Proc. USENIX HotOS 2005 . }}J. DeTreville. Making system configuration more declarative. In Proc. USENIX HotOS 2005."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653730"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. USENIX HotOS","author":"Dolstra E.","year":"2007","unstructured":"}} E. Dolstra and A. Hemel . Purely functional system configuration management . In Proc. USENIX HotOS 2007 . }}E. Dolstra and A. Hemel. Purely functional system configuration management. In Proc. USENIX HotOS 2007."},{"volume-title":"Proc. 2003 Network and Distributed Systems Security Symp. Internet Society.","author":"Garfinkel T.","key":"e_1_3_2_1_19_1","unstructured":"}} T. Garfinkel and M. Rosenblum . A virtual machine introspection based architecture for intrusion detection . In Proc. 2003 Network and Distributed Systems Security Symp. Internet Society. }}T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In Proc. 2003 Network and Distributed Systems Security Symp. Internet Society."},{"volume-title":"Developer Website","year":"2009","key":"e_1_3_2_1_20_1","unstructured":"}}Google. Android developer guide . Developer Website , 2009 . http:\/\/developer.android.com\/guide\/ publishing\/app-signing.html. }}Google. Android developer guide. Developer Website, 2009. http:\/\/developer.android.com\/guide\/ publishing\/app-signing.html."},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. Ottawa Linux Symposium","author":"Hallyn S. E.","year":"2008","unstructured":"}} S. E. Hallyn and A. G. Morgan . Linux capabilities: Making them work . In Proc. Ottawa Linux Symposium , Jul 2008 . }}S. E. Hallyn and A. G. Morgan. Linux capabilities: Making them work. In Proc. Ottawa Linux Symposium, Jul 2008."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133373.1133394"},{"key":"e_1_3_2_1_23_1","volume-title":"Debian Policy Manual","author":"Jackson I.","year":"1998","unstructured":"}} I. Jackson and C. Schwarz . Debian Policy Manual , 1998 . http:\/\/www.debian.org\/doc\/debian-policy\/. }}I. Jackson and C. Schwarz. Debian Policy Manual, 1998. http:\/\/www.debian.org\/doc\/debian-policy\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765533.1765545"},{"key":"e_1_3_2_1_25_1","volume-title":"Web site","author":"Kim A.","year":"2008","unstructured":"}} A. Kim . Apple's ability to deactivate malicious app store apps. Web site , 2008 . http: \/\/www.macrumors.com\/2008\/08\/06\/apples-ability-to-deactivate-malicious-app-store-apps\/. }}A. Kim. Apple's ability to deactivate malicious app store apps. Web site, 2008. http: \/\/www.macrumors.com\/2008\/08\/06\/apples-ability-to-deactivate-malicious-app-store-apps\/."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/191177.191183"},{"key":"e_1_3_2_1_27_1","volume-title":"Mailing List Posting","author":"Kjeldaas A.","year":"1998","unstructured":"}} A. Kjeldaas . Linux capability faq v0.1 . Mailing List Posting , Aug 1998 . http:\/\/lkml.indiana.edu\/hypermail\/linux\/kernel\/9808.1\/0178.html. }}A. Kjeldaas. Linux capability faq v0.1. Mailing List Posting, Aug 1998. http:\/\/lkml.indiana.edu\/hypermail\/linux\/kernel\/9808.1\/0178.html."},{"key":"e_1_3_2_1_28_1","volume-title":"Mastering FreeBSD and OpenBSD Security","author":"Kor Y.","year":"2005","unstructured":"}} Y. Kor , P. Hope , and B. Potter . Mastering FreeBSD and OpenBSD Security , chapter 2.1.2. O'Reilly , 2005 . }}Y. Kor, P. Hope, and B. Potter. Mastering FreeBSD and OpenBSD Security, chapter 2.1.2. O'Reilly, 2005."},{"key":"e_1_3_2_1_29_1","first-page":"48","volume":"117","author":"Kroah-Hartman G.","year":"2004","unstructured":"}} G. Kroah-Hartman . Signed kernel modules. Linux Journal , 117 : 48 -- 53 , 2004 . }}G. Kroah-Hartman. Signed kernel modules. Linux Journal, 117:48--53, 2004.","journal-title":"Linux Journal"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.19"},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. Australasian Information Security Workshop Conference on ACSW Frontiers","volume":"21","author":"Liu Q.","year":"2003","unstructured":"}} Q. Liu , R. Safavi-Naini , and N. P. Sheppard . Digital rights management for content distribution . In Proc. Australasian Information Security Workshop Conference on ACSW Frontiers , volume 21 , 2003 . }}Q. Liu, R. Safavi-Naini, and N. P. Sheppard. Digital rights management for content distribution. In Proc. Australasian Information Security Workshop Conference on ACSW Frontiers, volume 21, 2003."},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. FREENIX '01","author":"Loscocco P.","year":"2001","unstructured":"}} P. Loscocco and S. Smalley . Integrating flexible support for security policies into the Linux operating system . In Proc. FREENIX '01 , 2001 . }}P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In Proc. FREENIX '01, 2001."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/548089"},{"volume-title":"Web Page","year":"2007","key":"e_1_3_2_1_34_1","unstructured":"}}Microsoft. Description of the Windows file protection feature . Web Page , 2007 . http:\/\/support.microsoft.com\/kb\/222193. }}Microsoft. Description of the Windows file protection feature. Web Page, 2007. http:\/\/support.microsoft.com\/kb\/222193."},{"key":"e_1_3_2_1_36_1","volume-title":"The Definitive Guide to Windows Installer Technology","author":"Moskowitz J.","year":"2002","unstructured":"}} J. Moskowitz and D. Sanoy . The Definitive Guide to Windows Installer Technology . Realtimepublishers .com, 2002 . http:\/\/nexus.realtimepublishers.com\/dgwit.php. }}J. Moskowitz and D. Sanoy. The Definitive Guide to Windows Installer Technology. Realtimepublishers.com, 2002. http:\/\/nexus.realtimepublishers.com\/dgwit.php."},{"key":"e_1_3_2_1_37_1","volume-title":"Compiling from source. Web Page (viewed","author":"Muhammad H.","year":"2010","unstructured":"}} H. Muhammad . Compiling from source. Web Page (viewed 16 Feb 2010 ). http:\/\/gobo.kundor.org\/wiki\/Compiling_From_Source. }}H. Muhammad. Compiling from source. Web Page (viewed 16 Feb 2010). http:\/\/gobo.kundor.org\/wiki\/Compiling_From_Source."},{"key":"e_1_3_2_1_38_1","first-page":"k5","volume-title":"May","author":"Muhammad H.","year":"2003","unstructured":"}} H. Muhammad . The Unix tree rethought : an introduction to GoboLinux. Kuro5hin Article , May 2003 . http:\/\/gobolinux.org\/index.php?page= k5 . }}H. Muhammad. The Unix tree rethought: an introduction to GoboLinux. Kuro5hin Article, May 2003. http:\/\/gobolinux.org\/index.php?page=k5."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the III o WSL - Workshop em Software Livre","author":"Muhammad H.","year":"2002","unstructured":"}} H. Muhammad and A. Detsch . Uma nova proposta para a arvore de diretrios UNIX . In Proceedings of the III o WSL - Workshop em Software Livre , 2002 . }}H. Muhammad and A. Detsch. Uma nova proposta para a arvore de diretrios UNIX. In Proceedings of the III o WSL - Workshop em Software Livre, 2002."},{"volume-title":"Proc. 2003 USENIX Security Symp.","author":"Pennington A.","key":"e_1_3_2_1_40_1","unstructured":"}} A. Pennington , J. Strunk , J. Griffin , C. Soules , G. Goodson , and G. Ganger . Storage-based intrusion detection: Watching storage activity for suspicious behavior . In Proc. 2003 USENIX Security Symp. }}A. Pennington, J. Strunk, J. Griffin, C. Soules, G. Goodson, and G. Ganger. Storage-based intrusion detection: Watching storage activity for suspicious behavior. In Proc. 2003 USENIX Security Symp."},{"volume-title":"Proc. 2004 USENIX Security Symp.","author":"Petroni N. L.","key":"e_1_3_2_1_41_1","unstructured":"}} N. L. Petroni Jr ., T. Fraser , J. Molina , and W. A. Arbaugh . Copilot - a coprocessor-based kernel runtime integrity monitor . In Proc. 2004 USENIX Security Symp. }}N. L. Petroni Jr., T. Fraser, J. Molina, and W. A. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In Proc. 2004 USENIX Security Symp."},{"volume-title":"Proc. 2006 USENIX Security Symp.","author":"Petroni N. L.","key":"e_1_3_2_1_42_1","unstructured":"}} N. L. Petroni Jr ., T. Fraser , A. Walters , and W. Arbaugh . An architecture for specification-based detection of semantic integrity violations in kernel dynamic data . In Proc. 2006 USENIX Security Symp. }}N. L. Petroni Jr., T. Fraser, A. Walters, and W. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In Proc. 2006 USENIX Security Symp."},{"key":"e_1_3_2_1_43_1","volume-title":"Filesystem Hier- archy Standard","author":"Russell R.","year":"2004","unstructured":"}} R. Russell , D. Quinlan , and C. Yeoh . Filesystem Hier- archy Standard . Filesystem Hierarchy Standard Group , 2.3 edition, 2004 . http:\/\/www.pathname.com\/fhs\/. }}R. Russell, D. Quinlan, and C. Yeoh. Filesystem Hier- archy Standard. Filesystem Hierarchy Standard Group, 2.3 edition, 2004. http:\/\/www.pathname.com\/fhs\/."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653720"},{"key":"e_1_3_2_1_46_1","volume-title":"Registry watch. Software Application (viewed","author":"Software E.","year":"2009","unstructured":"}} E. Software . Registry watch. Software Application (viewed 23 Apr 2009 ). http:\/\/www.easydesksoftware.com\/regwatch.htm. }}E. Software. Registry watch. Software Application (viewed 23 Apr 2009). http:\/\/www.easydesksoftware.com\/regwatch.htm."},{"key":"e_1_3_2_1_47_1","volume-title":"Operating Systems: Internals and Design Principles","author":"Stallings W.","year":"2001","unstructured":"}} W. Stallings . Operating Systems: Internals and Design Principles . Prentice Hall , 4 th edition, 2001 . }}W. Stallings. Operating Systems: Internals and Design Principles. Prentice Hall, 4th edition, 2001.","edition":"4"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151030.1151033"},{"volume-title":"Proc. 2000 USENIX Symp. on Operating Systems Design and Implementation.","author":"Strunk J.","key":"e_1_3_2_1_49_1","unstructured":"}} J. Strunk , G. Goodson , M. Scheinholtz , C. Soules , and G. Ganger . Self-securing storage: Protecting data in compromised systems . In Proc. 2000 USENIX Symp. on Operating Systems Design and Implementation. }}J. Strunk, G. Goodson, M. Scheinholtz, C. Soules, and G. Ganger. Self-securing storage: Protecting data in compromised systems. In Proc. 2000 USENIX Symp. on Operating Systems Design and Implementation."},{"key":"e_1_3_2_1_50_1","volume-title":"Packagemaker how-to. Web site (viewed","author":"Sudre S.","year":"2009","unstructured":"}} S. Sudre . Packagemaker how-to. Web site (viewed 29 Oct 2009 ). http:\/\/s.sudre.free.fr\/Stuff\/ PackageMaker _Howto.html. }}S. Sudre. Packagemaker how-to. Web site (viewed 29 Oct 2009). http:\/\/s.sudre.free.fr\/Stuff\/ PackageMaker_Howto.html."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_9"},{"key":"e_1_3_2_1_52_1","volume-title":"Technical Report CSC-EPL-92-001","author":"ENIX","year":"1992","unstructured":"}}Trusted X ENIX version 3.0 final evaluation report. Technical Report CSC-EPL-92-001 , National Computer Security Center , 1992 . }}Trusted XENIX version 3.0 final evaluation report. Technical Report CSC-EPL-92-001, National Computer Security Center, 1992."},{"volume-title":"Proc. FREENIX Track: 2002 USENIX Annual Technical Conference.","author":"Ts'o T. Y.","key":"e_1_3_2_1_53_1","unstructured":"}} T. Y. Ts'o and S. Tweedie . Planned extensions to the Linux ext2\/ext3 filesystem . In Proc. FREENIX Track: 2002 USENIX Annual Technical Conference. }}T. Y. Ts'o and S. Tweedie. Planned extensions to the Linux ext2\/ext3 filesystem. In Proc. FREENIX Track: 2002 USENIX Annual Technical Conference."},{"key":"e_1_3_2_1_54_1","unstructured":"}}C. Tyler. Fedora Linux chapter 8.4. O'Reilly 2007.   }}C. Tyler. Fedora Linux chapter 8.4. O'Reilly 2007."},{"key":"e_1_3_2_1_55_1","unstructured":"}}Social engineering (trojan) via gnome-loook.org. Web Page (viewed 13 Feb 2010). http:\/\/ubuntuforums.org\/showthread.php?t=1349801.  }}Social engineering (trojan) via gnome-loook.org. Web Page (viewed 13 Feb 2010). http:\/\/ubuntuforums.org\/showthread.php?t=1349801."},{"key":"e_1_3_2_1_56_1","volume-title":"Proc. LISA '02: Eighteenth Systems Admin- istration Conference","author":"Venkatakrishnan V. N.","year":"2002","unstructured":"}} V. N. Venkatakrishnan , R. Sekar , T. Kamat , S. Tsipa , and Z. Liang . An approach for secure software installation . In Proc. LISA '02: Eighteenth Systems Admin- istration Conference , 2002 . }}V. N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, and Z. Liang. An approach for secure software installation. In Proc. LISA '02: Eighteenth Systems Admin- istration Conference, 2002."},{"key":"e_1_3_2_1_57_1","volume-title":"Dec","author":"Vervloesem K.","year":"2009","unstructured":"}} K. Vervloesem . Linux malware: an incident and some solutions. LWN.net Article , Dec 2009 . http:\/\/lwn. net\/Articles\/367024\/. }}K. Vervloesem. Linux malware: an incident and some solutions. LWN.net Article, Dec 2009. http:\/\/lwn. net\/Articles\/367024\/."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1600176.1600189"},{"volume-title":"Proc. 1996 USENIX Security Symp.","author":"Walker K. M.","key":"e_1_3_2_1_59_1","unstructured":"}} K. M. Walker , D. F. Sterne , M. L. Badger , M. J. Petkac , D. L. Sherman , and K. A. Oostendorp . Confining root programs with domain and type enforcement (DTE) . In Proc. 1996 USENIX Security Symp. }}K. M. Walker, D. F. Sterne, M. L. Badger, M. J. Petkac, D. L. Sherman, and K. A. Oostendorp. Confining root programs with domain and type enforcement (DTE). In Proc. 1996 USENIX Security Symp."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.39"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653728"},{"volume-title":"Proc. 2002 USENIX Security Symp.","author":"Wright C.","key":"e_1_3_2_1_62_1","unstructured":"}} C. Wright , C. Cowan , J. Morris , S. Smalley , and G. Kroah-Hartman . Linux security modules: General security support for the Linux kernel . In Proc. 2002 USENIX Security Symp. }}C. Wright, C. Cowan, J. Morris, S. Smalley, and G. Kroah-Hartman. Linux security modules: General security support for the Linux kernel. In Proc. 2002 USENIX Security Symp."},{"key":"e_1_3_2_1_63_1","author":"Wright C. P.","year":"2004","unstructured":"}} C. P. Wright and E. Zadok . Unionfs: Bringing filesystems together. Linux Journal, (128):24--29 , Dec 2004 . }}C. P. Wright and E. Zadok. Unionfs: Bringing filesystems together. Linux Journal, (128):24--29, Dec 2004.","journal-title":"Unionfs: Bringing filesystems together. Linux Journal, (128):24--29"},{"key":"e_1_3_2_1_65_1","volume-title":"USENIX HotSec","author":"Wurster G.","year":"2007","unstructured":"}} G. Wurster and P. van Oorschot . Self-signed executables: Restricting replacement of program binaries by malware . In USENIX HotSec 2007 . }}G. Wurster and P. van Oorschot. Self-signed executables: Restricting replacement of program binaries by malware. In USENIX HotSec 2007."},{"key":"e_1_3_2_1_66_1","volume-title":"USENIX HotSec","author":"Wurster G.","year":"2009","unstructured":"}} G. Wurster and P. C. van Oorschot . System configuration as a privilege . In USENIX HotSec 2009 . }}G. Wurster and P. C. van Oorschot. System configuration as a privilege. In USENIX HotSec 2009."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/SISW.2005.17"}],"event":{"name":"CCS '10: 17th ACM Conference on Computer and Communications Security 2010","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS '10"},"container-title":["Proceedings of the 17th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1866307.1866333","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1866307.1866333","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:09:07Z","timestamp":1750248547000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1866307.1866333"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,4]]},"references-count":62,"alternative-id":["10.1145\/1866307.1866333","10.1145\/1866307"],"URL":"https:\/\/doi.org\/10.1145\/1866307.1866333","relation":{},"subject":[],"published":{"date-parts":[[2010,10,4]]},"assertion":[{"value":"2010-10-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}