{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:28Z","timestamp":1763468248221,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,10,21]],"date-time":"2014-10-21T00:00:00Z","timestamp":1413849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF-CNS-0831360, NSF-CNS-1117411"],"award-info":[{"award-number":["NSF-CNS-0831360, NSF-CNS-1117411"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,10,21]]},"DOI":"10.1145\/2688130.2688135","type":"proceedings-article","created":{"date-parts":[[2015,1,12]],"date-time":"2015-01-12T20:42:45Z","timestamp":1421095365000},"page":"15-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["PERMITME"],"prefix":"10.1145","author":[{"given":"Emmanuel","family":"Bello-Ogunu","sequence":"first","affiliation":[{"name":"UNC Charlotte, Charlotte, NC, USA"}]},{"given":"Mohamed","family":"Shehab","sequence":"additional","affiliation":[{"name":"UNC Charlotte, Charlotte, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1251535.1251536"},{"key":"e_1_3_2_1_4_1","unstructured":"O. Consortium. ASM: a bytecode engineering library. http:\/\/asm.ow2.org\/index.html 12 Oct 2013.  O. Consortium. ASM: a bytecode engineering library. http:\/\/asm.ow2.org\/index.html 12 Oct 2013."},{"key":"e_1_3_2_1_5_1","volume-title":"O\u2019reilly","author":"Cranor L. F.","year":"2007","unstructured":"L. F. Cranor . Security and usability: Designing secure systems that people can use . O\u2019reilly , 2007 . L. F. Cranor. Security and usability: Designing secure systems that people can use. O\u2019reilly, 2007."},{"key":"e_1_3_2_1_6_1","unstructured":"A. Developers. Android developers: Permissions. http:\/\/developer.android.com\/guide\/topics\/security\/permissions.html.  A. Developers. Android developers: Permissions. http:\/\/developer.android.com\/guide\/topics\/security\/permissions.html."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052883.1052895"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1251535.1251537"},{"key":"e_1_3_2_1_10_1","volume-title":"Privacy as part of the app decision-making process","author":"Sadeh N.","year":"2013","unstructured":"N. Sadeh , L. F. Cranor , and P. G. Kelley . Privacy as part of the app decision-making process , 2013 . N. Sadeh, L. F. Cranor, and P. G. Kelley. Privacy as part of the app decision-making process, 2013."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487093"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the Web","volume":"2","author":"Vidas T.","year":"2011","unstructured":"T. Vidas , N. Christin , and L. Cranor . Curbing android permission creep . In Proceedings of the Web , volume 2 , 2011 . T. Vidas, N. Christin, and L. Cranor. Curbing android permission creep. In Proceedings of the Web, volume 2, 2011."},{"key":"e_1_3_2_1_14_1","volume-title":"http:\/\/www.vogella.com\/tutorials\/EclipseJDT\/article.html","author":"Vogel L.","year":"2012","unstructured":"L. Vogel . Eclipse JDT - Abstract Syntax Tree (AST) and the Java Model . http:\/\/www.vogella.com\/tutorials\/EclipseJDT\/article.html , 08 Aug 2012 . L. Vogel. Eclipse JDT - Abstract Syntax Tree (AST) and the Java Model. http:\/\/www.vogella.com\/tutorials\/EclipseJDT\/article.html, 08 Aug 2012."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420956"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076770"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445396"}],"event":{"name":"SPLASH '14: Conference on Systems, Programming, and Applications: Software for Humanity","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGAda ACM Special Interest Group on Ada Programming Language"],"location":"Portland Oregon USA","acronym":"SPLASH '14"},"container-title":["Proceedings of the 2014 Workshop on Eclipse Technology eXchange"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2688130.2688135","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2688130.2688135","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:04Z","timestamp":1750227184000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2688130.2688135"}},"subtitle":["integrating android permissioning support in the IDE"],"short-title":[],"issued":{"date-parts":[[2014,10,21]]},"references-count":17,"alternative-id":["10.1145\/2688130.2688135","10.1145\/2688130"],"URL":"https:\/\/doi.org\/10.1145\/2688130.2688135","relation":{},"subject":[],"published":{"date-parts":[[2014,10,21]]},"assertion":[{"value":"2014-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}