{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:18:29Z","timestamp":1759133909439,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T00:00:00Z","timestamp":1445817600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Stevens","award":["33649.1.1042344"],"award-info":[{"award-number":["33649.1.1042344"]}]},{"name":"Bosch Research and Technology Center North America"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,26]]},"DOI":"10.1145\/2846661.2846664","type":"proceedings-article","created":{"date-parts":[[2016,1,29]],"date-time":"2016-01-29T15:05:10Z","timestamp":1454079910000},"page":"28-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Enforcing fine-grained security and privacy policies in an ecosystem within an ecosystem"],"prefix":"10.1145","author":[{"given":"Waqar","family":"Ahmad","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Joshua","family":"Sunshine","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Christian","family":"Kaestner","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Adam","family":"Wynne","sequence":"additional","affiliation":[{"name":"Bosch Research and Technology Center, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"volume-title":"A survivor\u2019s guide to java program analysis with soot. page http:\/\/www.brics.dk\/ SootGuide\/sootsurvivorsguide.pdf","year":"2008","author":"Einarsson A.","key":"e_1_3_2_1_2_1"},{"volume-title":"ESORICS 2012:  17th European Symposium on Research in Computer Security, 7459 of Lecture Notes in Computer Science:1\u201318","year":"2012","author":"Fragkaki E.","key":"e_1_3_2_1_3_1"},{"volume-title":"System permissions. Android Developer Guide, page http:\/\/developer.android.com\/ guide\/topics\/security\/permissions.html","year":"2015","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_43"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818791"},{"volume-title":"Proceedings of the 22Nd USENIX Conference on Security, SEC\u201913","year":"2013","author":"Octeau D.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818767"},{"volume-title":"page https:\/\/en. wikipedia.org\/wiki\/Android_(operating_system)","year":"2015","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"key":"e_1_3_2_1_12_1","unstructured":"Introduction Problem Statement Proposed Solution Current Work Related Work Conclusion and Future Work  Introduction Problem Statement Proposed Solution Current Work Related Work Conclusion and Future Work"}],"event":{"name":"SPLASH '15: Conference on Systems, Programming, Languages, and Applications: Software for Humanity","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGAda ACM Special Interest Group on Ada Programming Language"],"location":"Pittsburgh PA USA","acronym":"SPLASH '15"},"container-title":["Proceedings of the 3rd International Workshop on Mobile Development Lifecycle"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2846661.2846664","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2846661.2846664","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:25Z","timestamp":1750225705000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2846661.2846664"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,26]]},"references-count":12,"alternative-id":["10.1145\/2846661.2846664","10.1145\/2846661"],"URL":"https:\/\/doi.org\/10.1145\/2846661.2846664","relation":{},"subject":[],"published":{"date-parts":[[2015,10,26]]},"assertion":[{"value":"2015-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}