{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:12:48Z","timestamp":1750306368797,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,6,6]],"date-time":"2016-06-06T00:00:00Z","timestamp":1465171200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,6,6]]},"DOI":"10.1145\/2914642.2914645","type":"proceedings-article","created":{"date-parts":[[2016,6,10]],"date-time":"2016-06-10T13:09:57Z","timestamp":1465564197000},"page":"25-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An Application Restriction System for Bring-Your-Own-Device Scenarios"],"prefix":"10.1145","author":[{"given":"Oyindamola","family":"Oluwatimi","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Enterprise mobility management smackdown. http:\/\/www.pqr.com\/enterprise-mobility-management-smackdown.  Enterprise mobility management smackdown. http:\/\/www.pqr.com\/enterprise-mobility-management-smackdown."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"G.\n       \n      Bai L.\n       \n      Gu T.\n       \n      Feng Y.\n       \n      Guo and \n      \n      \n      X.\n       \n      Chen\n      \n  \n  . \n  Context-aware usage control for android. In S. Jajodia and J. Zhou editors Security and Privacy in Communication Networks volume \n  50\n   of \n  Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering pages \n  326\n  --\n  343\n  . \n  Springer Berlin Heidelberg 2010\n  .  G. Bai L. Gu T. Feng Y. Guo and X. Chen. Context-aware usage control for android. In S. Jajodia and J. Zhou editors Security and Privacy in Communication Networks volume 50 of Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering pages 326--343. Springer Berlin Heidelberg 2010.","DOI":"10.1007\/978-3-642-16161-2_19"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"key":"e_1_3_2_1_5_1","unstructured":"B. Choudhary and J. Risikko. Mobile device security element. Key Findings from Technical Analysis 1:1--8 2005.  B. Choudhary and J. Risikko. Mobile device security element. Key Findings from Technical Analysis 1:1--8 2005."},{"key":"e_1_3_2_1_6_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1007\/978-3-642-18178-8_30","volume-title":"M. Burmester, G. Tsudik, S. Magliveras, and I. Ili?","author":"Davi L.","year":"2011"},{"volume-title":"No Starch Press","year":"2014","author":"Elenkov N.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.12.004"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(12)70111-3"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"O. Oluwatimi D. Midi and E. Bertino. Overview of mobile containerization approaches and open research directions. Under submission 2016.  O. Oluwatimi D. Midi and E. Bertino. Overview of mobile containerization approaches and open research directions. Under submission 2016.","DOI":"10.1109\/MSP.2017.12"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/NFC.2009.14"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(14)70007-7"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295140"},{"key":"e_1_3_2_1_17_1","first-page":"1033","volume-title":"Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on","author":"Russello G.","year":"2011"},{"issue":"2","key":"e_1_3_2_1_18_1","first-page":"150","article-title":"Context-based access control systems for mobile devices. Dependable and Secure Computing","volume":"12","author":"Shebaro B.","year":"2015","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2612163.2612165"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2013.45"},{"key":"e_1_3_2_1_21_1","first-page":"10","volume-title":"Proceedings of the 5th USENIX Conference on Offensive Technologies, WOOT'11","author":"Vidas T.","year":"2011"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022245.2022255"}],"event":{"name":"SACMAT 2016: The 21st ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Shanghai China","acronym":"SACMAT 2016"},"container-title":["Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2914642.2914645","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2914642.2914645","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:26Z","timestamp":1750222586000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2914642.2914645"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,6]]},"references-count":22,"alternative-id":["10.1145\/2914642.2914645","10.1145\/2914642"],"URL":"https:\/\/doi.org\/10.1145\/2914642.2914645","relation":{},"subject":[],"published":{"date-parts":[[2016,6,6]]},"assertion":[{"value":"2016-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}