{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:13:23Z","timestamp":1750306403873,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,22]],"date-time":"2015-06-22T00:00:00Z","timestamp":1434931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,22]]},"DOI":"10.1145\/2766498.2774989","type":"proceedings-article","created":{"date-parts":[[2015,6,23]],"date-time":"2015-06-23T13:03:05Z","timestamp":1435064585000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Study of compliance of Android location APIs with Geopriv"],"prefix":"10.1145","author":[{"given":"Pradeep","family":"Podiyan","sequence":"first","affiliation":[{"name":"Concordia University of Edmonton, Edmonton, Canada"}]},{"given":"Sergey","family":"Butakov","sequence":"additional","affiliation":[{"name":"Concordia University of Edmonton, Edmonton, Canada"}]},{"given":"Pavol","family":"Zavarsky","sequence":"additional","affiliation":[{"name":"Concordia University of Edmonton, Edmonton, Canada"}]}],"member":"320","published-online":{"date-parts":[[2015,6,22]]},"reference":[{"unstructured":"Architecture for Location and Location Privacy in Internet Applications (2011 July) {Online} Available: https:\/\/tools.ietf.org\/html\/rfc6280  Architecture for Location and Location Privacy in Internet Applications (2011 July) {Online} Available: https:\/\/tools.ietf.org\/html\/rfc6280","key":"e_1_3_2_1_1_1"},{"volume-title":"A. R., Rice, A., Skehin, N.","year":"2011","key":"e_1_3_2_1_2_1"},{"unstructured":"Placemask {Online} Available: http:\/\/www.placemask.com  Placemask {Online} Available: http:\/\/www.placemask.com","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/2660267.2660270"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/2619091"},{"unstructured":"Common policy language (2009 July) {Online} Available: https:\/\/tools.ietf.org\/html\/draft-ietf-geopriv-policy-21  Common policy language (2009 July) {Online} Available: https:\/\/tools.ietf.org\/html\/draft-ietf-geopriv-policy-21","key":"e_1_3_2_1_6_1"},{"unstructured":"XCAP rule installer (2007 May) {Online} Available: https:\/\/tools.ietf.org\/html\/rfc4825  XCAP rule installer (2007 May) {Online} Available: https:\/\/tools.ietf.org\/html\/rfc4825","key":"e_1_3_2_1_7_1"},{"unstructured":"Android Development strategies {Online} Available: http:\/\/developer.android.com\/guide\/topics\/location\/strategies.html  Android Development strategies {Online} Available: http:\/\/developer.android.com\/guide\/topics\/location\/strategies.html","key":"e_1_3_2_1_8_1"},{"unstructured":"Android.location {Online} Available: http:\/\/developer.android.com\/reference\/android\/location\/package-summary.html.  Android.location {Online} Available: http:\/\/developer.android.com\/reference\/android\/location\/package-summary.html.","key":"e_1_3_2_1_9_1"},{"unstructured":"Google Play API {Online} Available: https:\/\/developer.android.com\/training\/location\/index.html.  Google Play API {Online} Available: https:\/\/developer.android.com\/training\/location\/index.html.","key":"e_1_3_2_1_10_1"},{"unstructured":"Android GEOFENCING {Online} Available: https:\/\/developer.android.com\/training\/location\/geofencing.html.  Android GEOFENCING {Online} Available: https:\/\/developer.android.com\/training\/location\/geofencing.html.","key":"e_1_3_2_1_11_1"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","US Army Research Office US Army Research Office","NSF National Science Foundation","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"acronym":"WiSec'15","name":"WiSec'15: 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks","location":"New York New York"},"container-title":["Proceedings of the 8th ACM Conference on Security &amp; Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2766498.2774989","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2766498.2774989","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:32Z","timestamp":1750223252000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2766498.2774989"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,22]]},"references-count":11,"alternative-id":["10.1145\/2766498.2774989","10.1145\/2766498"],"URL":"https:\/\/doi.org\/10.1145\/2766498.2774989","relation":{},"subject":[],"published":{"date-parts":[[2015,6,22]]},"assertion":[{"value":"2015-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}