{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T09:42:26Z","timestamp":1773567746447,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T00:00:00Z","timestamp":1401840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,4]]},"DOI":"10.1145\/2590296.2590337","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"293-304","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["ConXsense"],"prefix":"10.1145","author":[{"given":"Markus","family":"Miettinen","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Stephan","family":"Heuser","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Wiebke","family":"Kronz","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"N.","family":"Asokan","sequence":"additional","affiliation":[{"name":"Aalto University &amp; University of Helsinki, Espoo &amp; Helsinki, Finland"}]}],"member":"320","published-online":{"date-parts":[[2014,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Oxford University Press","author":"Alan B.","year":"2007"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16161-2_19"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517881.2517886"},{"key":"e_1_3_2_1_4_1","volume-title":"Culture & Society. SAGE Publications","author":"U. Beck. Risk Society","year":"1992"},{"key":"e_1_3_2_1_5_1","unstructured":"M. Bell and V. Lovich. Apparatus and methods for enforcement of policies upon a wireless device. US. Patent 8254902 Aug. 2012.  M. Bell and V. Lovich. Apparatus and methods for enforcement of policies upon a wireless device. US. Patent 8254902 Aug. 2012."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046624"},{"key":"e_1_3_2_1_7_1","volume-title":"22nd USENIX Security Symposium (USENIX Security '13)","author":"Bugiel S.","year":"2013"},{"key":"e_1_3_2_1_8_1","first-page":"9","volume-title":"6th USENIX Conference on Hot Topics in Security, HotSec'11","author":"Cai L.","year":"2011"},{"key":"e_1_3_2_1_9_1","unstructured":"C. Camp. The BYOD security challenge: How scary is the iPad tablet smartphone surge? WeLiveSecurity Blog post February 2012.  C. Camp. The BYOD security challenge: How scary is the iPad tablet smartphone surge? WeLiveSecurity Blog post February 2012."},{"key":"e_1_3_2_1_10_1","volume-title":"Taylor & Francis","author":"Cohen S.","year":"1992"},{"issue":"5","key":"e_1_3_2_1_11_1","first-page":"1426","article-title":"CR^ePE: A system for enforcing fine-grained context-related policies on android. Information Forensics and Security","volume":"7","author":"Conti M.","year":"2012","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/784592.784769"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1210263.1210265"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2012.46"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.37"},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"9th USENIX conference on Operating systems design and implementation, OSDI'10","author":"Enck W.","year":"2010"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.60"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501607"},{"key":"e_1_3_2_1_20_1","volume-title":"Frank & Timme","author":"Hoich J.","year":"2006"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2004.1263065"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094549.1094558"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456377.1456380"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864394"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-011-0982-z"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2011.6034016"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.39"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_2_1_31_1","volume-title":"21st USENIX Security Symposium","author":"Riva O.","year":"2012"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295140"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0214-3"},{"key":"e_1_3_2_1_34_1","first-page":"98","volume-title":"Learning for Text Categorization: Papers from the 1998 workshop","author":"Sahami M.","year":"1998"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"R.\n       \n      Sandhu\n     and \n      \n      \n      J.\n       \n      Park\n      \n  \n  . \n  Usage control: A vision for next generation access control. In V. Gorodetsky L. Popyack and V. Skormin editors Computer Network Security volume \n  2776\n   of \n  Lecture Notes in Computer Science pages \n  17\n  --\n  31\n  . \n  Springer Berlin Heidelberg 2003\n  .  R. Sandhu and J. Park. Usage control: A vision for next generation access control. In V. Gorodetsky L. Popyack and V. Skormin editors Computer Network Security volume 2776 of Lecture Notes in Computer Science pages 17--31. Springer Berlin Heidelberg 2003.","DOI":"10.1007\/978-3-540-45215-7_2"},{"key":"e_1_3_2_1_36_1","first-page":"17","volume-title":"Network & Distributed System Security Symposium (NDSS'11)","author":"Schlegel R.","year":"2011"},{"key":"e_1_3_2_1_37_1","volume-title":"Sociology: History. W. W. Norton","author":"Sennett R.","year":"1992"},{"key":"e_1_3_2_1_38_1","volume-title":"McAfee Blog Central","author":"Siciliano R.","year":"2013"},{"key":"e_1_3_2_1_39_1","volume-title":"Network & Distributed System Security Symposium (NDSS'13)","author":"Smalley S.","year":"2013"},{"key":"e_1_3_2_1_40_1","volume-title":"SAGE Publications","author":"Tashakkori A.","year":"2003"},{"key":"e_1_3_2_1_41_1","volume-title":"SAGE Publications","author":"Teddlie C.","year":"2009"},{"key":"e_1_3_2_1_42_1","volume-title":"Network & Distributed System Security Symposium (NDSS'13)","author":"Templeman R.","year":"2013"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0197-0"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514285"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772795"}],"event":{"name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","location":"Kyoto Japan","acronym":"ASIA CCS '14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 9th ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590337","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2590296.2590337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:52Z","timestamp":1750229752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590337"}},"subtitle":["automated context classification for context-aware access control"],"short-title":[],"issued":{"date-parts":[[2014,6,4]]},"references-count":46,"alternative-id":["10.1145\/2590296.2590337","10.1145\/2590296"],"URL":"https:\/\/doi.org\/10.1145\/2590296.2590337","relation":{},"subject":[],"published":{"date-parts":[[2014,6,4]]},"assertion":[{"value":"2014-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}