{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:28Z","timestamp":1750306168922,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,5]],"date-time":"2016-10-05T00:00:00Z","timestamp":1475625600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,5]]},"DOI":"10.1145\/2987550.2987587","type":"proceedings-article","created":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T12:42:53Z","timestamp":1474461773000},"page":"265-278","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Preserving Collaboration in Bring-Your-Own-Apps"],"prefix":"10.1145","author":[{"given":"Sangmin","family":"Lee","sequence":"first","affiliation":[{"name":"Microsoft"}]},{"given":"Deepak","family":"Goel","sequence":"additional","affiliation":[{"name":"FireEye Inc"}]},{"given":"Edmund L.","family":"Wong","sequence":"additional","affiliation":[{"name":"Cisco Meraki"}]},{"given":"Asim","family":"Kadav","sequence":"additional","affiliation":[{"name":"NEC Labs"}]},{"given":"Mike","family":"Dahlin","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin"}]}],"member":"320","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"unstructured":"Airwatch containerization. http:\/\/www.air-watch.com\/solutions\/containerization.  Airwatch containerization. http:\/\/www.air-watch.com\/solutions\/containerization.","key":"e_1_3_2_1_1_1"},{"unstructured":"Android malware promises video while stealing contacts. http:\/\/blogs.mcafee.com\/mcafee-labs\/android-malware-promises-video-while-stealing-contacts.  Android malware promises video while stealing contacts. http:\/\/blogs.mcafee.com\/mcafee-labs\/android-malware-promises-video-while-stealing-contacts.","key":"e_1_3_2_1_2_1"},{"unstructured":"Blackberry balance. http:\/\/us.blackberry.com\/business\/software\/blackberry-balance.html.  Blackberry balance. http:\/\/us.blackberry.com\/business\/software\/blackberry-balance.html.","key":"e_1_3_2_1_3_1"},{"unstructured":"Chord: A program analysis platform for java. http:\/\/pag.gatech.edu\/chord\/.  Chord: A program analysis platform for java. http:\/\/pag.gatech.edu\/chord\/.","key":"e_1_3_2_1_4_1"},{"unstructured":"Cloud report: Popular apps like Dropbox and Skype are banned by some companies embraced by others. http:\/\/tabtimes.com\/feature\/deployment-strategy\/2012\/08\/03\/cloud-report-popular-apps-dropbox-and-skype-are-banned-some.  Cloud report: Popular apps like Dropbox and Skype are banned by some companies embraced by others. http:\/\/tabtimes.com\/feature\/deployment-strategy\/2012\/08\/03\/cloud-report-popular-apps-dropbox-and-skype-are-banned-some.","key":"e_1_3_2_1_5_1"},{"unstructured":"Consumer apps invade businesses. http:\/\/www.telegraph.co.uk\/technology\/news\/9604852\/Consumer-apps-invade-businesses.html.  Consumer apps invade businesses. http:\/\/www.telegraph.co.uk\/technology\/news\/9604852\/Consumer-apps-invade-businesses.html.","key":"e_1_3_2_1_6_1"},{"unstructured":"First iOS malware hits App Store. http:\/\/www.forbes.com\/sites\/adriankingsleyhughes\/2012\/07\/06\/first-ios-malware-hits-app-store.  First iOS malware hits App Store. http:\/\/www.forbes.com\/sites\/adriankingsleyhughes\/2012\/07\/06\/first-ios-malware-hits-app-store.","key":"e_1_3_2_1_7_1"},{"unstructured":"From devices to apps: New research shows bring-your-own trend fueling consumer app adoption in the workplace. https:\/\/investor.logmein.com\/releasedetail.cfm?ReleaseID=725849.  From devices to apps: New research shows bring-your-own trend fueling consumer app adoption in the workplace. https:\/\/investor.logmein.com\/releasedetail.cfm?ReleaseID=725849.","key":"e_1_3_2_1_8_1"},{"unstructured":"Good's secure mobile solution. http:\/\/www1.good.com\/secure-mobility-solution.  Good's secure mobile solution. http:\/\/www1.good.com\/secure-mobility-solution.","key":"e_1_3_2_1_9_1"},{"unstructured":"Google apps directory sync. http:\/\/support.google.com\/a\/bin\/answer.py?hl=en&answer=106368.  Google apps directory sync. http:\/\/support.google.com\/a\/bin\/answer.py?hl=en&answer=106368.","key":"e_1_3_2_1_10_1"},{"unstructured":"Google enables private Play stores. http:\/\/www.theregister.co.uk\/2012\/12\/07\/google_announces_private_channels_in_play_for_byod_apps.  Google enables private Play stores. http:\/\/www.theregister.co.uk\/2012\/12\/07\/google_announces_private_channels_in_play_for_byod_apps.","key":"e_1_3_2_1_11_1"},{"unstructured":"HBase. http:\/\/hbase.apache.org.  HBase. http:\/\/hbase.apache.org.","key":"e_1_3_2_1_12_1"},{"unstructured":"How much information? 2003. http:\/\/www2.sims.berkeley.edu\/research\/projects\/how-much-info-2003\/execsum.htm#summary.  How much information? 2003. http:\/\/www2.sims.berkeley.edu\/research\/projects\/how-much-info-2003\/execsum.htm#summary.","key":"e_1_3_2_1_13_1"},{"unstructured":"IBM bans Dropbox Siri and rival cloud tech at work. http:\/\/www.theregister.co.uk\/2012\/05\/25\/ibm_bans_dropbox_siri.  IBM bans Dropbox Siri and rival cloud tech at work. http:\/\/www.theregister.co.uk\/2012\/05\/25\/ibm_bans_dropbox_siri.","key":"e_1_3_2_1_14_1"},{"unstructured":"iOS social apps leak contact data. http:\/\/www.informationweek.com\/news\/security\/privacy\/232600490.  iOS social apps leak contact data. http:\/\/www.informationweek.com\/news\/security\/privacy\/232600490.","key":"e_1_3_2_1_15_1"},{"unstructured":"Is Google helpless to stop the scourge of Android malware? http:\/\/www.digitaltrends.com\/mobile\/who-can-fight-android-malware-not-google.  Is Google helpless to stop the scourge of Android malware? http:\/\/www.digitaltrends.com\/mobile\/who-can-fight-android-malware-not-google.","key":"e_1_3_2_1_16_1"},{"unstructured":"Jetty. http:\/\/www.eclipse.org\/jetty.  Jetty. http:\/\/www.eclipse.org\/jetty.","key":"e_1_3_2_1_17_1"},{"unstructured":"Jif: Java information flow. http:\/\/www.cs.cornell.edu\/jif.  Jif: Java information flow. http:\/\/www.cs.cornell.edu\/jif.","key":"e_1_3_2_1_18_1"},{"unstructured":"Malicious adware found in 24% of google play apps. http:\/\/www.cbronline.com\/news\/security\/malicious-adware-found-in-238-google-play-apps-in-h1-041113.  Malicious adware found in 24% of google play apps. http:\/\/www.cbronline.com\/news\/security\/malicious-adware-found-in-238-google-play-apps-in-h1-041113.","key":"e_1_3_2_1_19_1"},{"unstructured":"Privacy statement for the Microsoft error reporting service. http:\/\/windows.microsoft.com\/en-US\/Windows\/microsoft-error-reporting-privacy-statement.  Privacy statement for the Microsoft error reporting service. http:\/\/windows.microsoft.com\/en-US\/Windows\/microsoft-error-reporting-privacy-statement.","key":"e_1_3_2_1_20_1"},{"unstructured":"Samsung knox. https:\/\/www.samsungknox.com\/en.  Samsung knox. https:\/\/www.samsungknox.com\/en.","key":"e_1_3_2_1_21_1"},{"unstructured":"Starbucks iOS app leaves user data in the clear. http:\/\/arstechnica.com\/security\/2014\/01\/starbucks-ios-app-leaves-user-data-in-the-clear\/.  Starbucks iOS app leaves user data in the clear. http:\/\/arstechnica.com\/security\/2014\/01\/starbucks-ios-app-leaves-user-data-in-the-clear\/.","key":"e_1_3_2_1_22_1"},{"unstructured":"Twitter apologizes for squirreling away iPhone user data. http:\/\/www.csmonitor.com\/Innovation\/Horizons\/2012\/0216\/Twitter-apologizes-for-squirreling-away-iPhone-user-data.  Twitter apologizes for squirreling away iPhone user data. http:\/\/www.csmonitor.com\/Innovation\/Horizons\/2012\/0216\/Twitter-apologizes-for-squirreling-away-iPhone-user-data.","key":"e_1_3_2_1_23_1"},{"unstructured":"Volume purchase program for business. http:\/\/www.apple.com\/business\/vpp.  Volume purchase program for business. http:\/\/www.apple.com\/business\/vpp.","key":"e_1_3_2_1_24_1"},{"volume-title":"July","year":"2010","unstructured":"300,000 mobile apps stealing personal data. http:\/\/www.itproportal.com\/2010\/07\/29\/300000-mobile-apps-stealing-personal-data , July 2010 . 300,000 mobile apps stealing personal data. http:\/\/www.itproportal.com\/2010\/07\/29\/300000-mobile-apps-stealing-personal-data, July 2010.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","first-page":"273","volume-title":"Proceedings of the 12th Usenix Security Symposium","author":"Broadwell P.","year":"2003","unstructured":"P. Broadwell , M. Harren , and N. Sastry . Scrash: A system for generating secure crash information . In Proceedings of the 12th Usenix Security Symposium , pages 273 -- 284 , August 2003 . P. Broadwell, M. Harren, and N. Sastry. Scrash: A system for generating secure crash information. In Proceedings of the 12th Usenix Security Symposium, pages 273--284, August 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/1346281.1346322"},{"key":"e_1_3_2_1_28_1","first-page":"143","volume-title":"11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)","author":"Chakraborty S.","year":"2014","unstructured":"S. Chakraborty , C. Shen , K. R. Raghavan , Y. Shoukry , M. Millar , and M. Srivastava . ipshield: a framework for enforcing context-aware privacy . In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14) , pages 143 -- 156 . USENIX Association , 2014 . S. Chakraborty, C. Shen, K. R. Raghavan, Y. Shoukry, M. Millar, and M. Srivastava. ipshield: a framework for enforcing context-aware privacy. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14), pages 143--156. USENIX Association, 2014."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.5555\/2685048.2685091"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/1247660.1247688"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/11685654_10","volume-title":"Theoretical computer science","author":"Dinitz Y.","year":"2006","unstructured":"Y. Dinitz . Theoretical computer science . chapter Dinitz' algorithm: the original version and even's version, pages 218 -- 240 . Springer-Verlag , 2006 . Y. Dinitz. Theoretical computer science. chapter Dinitz' algorithm: the original version and even's version, pages 218--240. Springer-Verlag, 2006."},{"key":"e_1_3_2_1_32_1","volume-title":"TAMC","author":"Dwork C.","year":"2008","unstructured":"C. Dwork . Differential privacy : A survey of results . In TAMC 2008 . C. Dwork. Differential privacy: A survey of results. In TAMC 2008."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1007\/11787006_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of OSDI 2010","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B.-G. Chun , L. P. Cox , J. Jung , P. Mc-Daniel , and A. N. Sheth . TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones . In Proceedings of OSDI 2010 , October 2010 . W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. Mc-Daniel, and A. N. Sheth. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of OSDI 2010, October 2010."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_37_1","volume-title":"OSDI","author":"Giffin D. B.","year":"2012","unstructured":"D. B. Giffin , A. Levy , D. Stefan , D. Terei , D. Mazi\u00e8res , J. Mitchell , and A. Russo . Hails: Protecting data privacy in untrusted web applications . In OSDI , 2012 . D. B. Giffin, A. Levy, D. Stefan, D. Terei, D. Mazi\u00e8res, J. Mitchell, and A. Russo. Hails: Protecting data privacy in untrusted web applications. In OSDI, 2012."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.5555\/2028067.2028100"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1145\/2046707.2046780"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1109\/CSF.2014.35"},{"key":"e_1_3_2_1_41_1","volume-title":"IEEE Symposium on Security and Privacy","author":"Hu W.-M.","year":"1987","unstructured":"W.-M. Hu . Reducing timing channels with fuzzy time . In IEEE Symposium on Security and Privacy , 1987 . W.-M. Hu. Reducing timing channels with fuzzy time. In IEEE Symposium on Security and Privacy, 1987."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1145\/1294261.1294293"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1145\/362375.362389"},{"unstructured":"S. Lee. Towards A Privacy-preserving Platform for Apps. PhD thesis The University of Texas at Austin 2014.  S. Lee. Towards A Privacy-preserving Platform for Apps. PhD thesis The University of Texas at Austin 2014.","key":"e_1_3_2_1_44_1"},{"key":"e_1_3_2_1_45_1","volume-title":"NSDI","author":"Lee S.","year":"2013","unstructured":"S. Lee , E. L. Wong , D. Goel , M. Dahlin , and V. Shmatikov . &pi;box: A platform for privacy-preserving apps . In NSDI , 2013 . S. Lee, E. L. Wong, D. Goel, M. Dahlin, and V. Shmatikov. &pi;box: A platform for privacy-preserving apps. In NSDI, 2013."},{"unstructured":"App sandbox in depth. https:\/\/developer.apple.com\/library\/mac\/documentation\/Security\/Conceptual\/AppSandboxDesignGuide\/AppSandboxInDepth\/AppSandboxInDepth.html#\/\/apple_ref\/doc\/uid\/TP40011183-CH3-SW4.  App sandbox in depth. https:\/\/developer.apple.com\/library\/mac\/documentation\/Security\/Conceptual\/AppSandboxDesignGuide\/AppSandboxInDepth\/AppSandboxInDepth.html#\/\/apple_ref\/doc\/uid\/TP40011183-CH3-SW4.","key":"e_1_3_2_1_46_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.1145\/1851182.1851199"},{"unstructured":"J. Mick. Android wallpaper app stole scores of users' data sent it to China. http:\/\/www.dailytech.com\/Android+Wallpaper+App+Stole+Scores+of+Users+Data+Sent+it+to+China\/article19200.htm July 2010.  J. Mick. Android wallpaper app stole scores of users' data sent it to China. http:\/\/www.dailytech.com\/Android+Wallpaper+App+Stole+Scores+of+Users+Data+Sent+it+to+China\/article19200.htm July 2010.","key":"e_1_3_2_1_48_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_49_1","DOI":"10.1145\/268998.266669"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_50_1","DOI":"10.1145\/2046707.2046781"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_51_1","DOI":"10.1145\/1653662.1653687"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_52_1","DOI":"10.1145\/2380116.2380147"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_53_1","DOI":"10.1145\/1542476.1542484"},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Roy I.","year":"2010","unstructured":"I. Roy , S. Setty , A. Kilzer , V. Shmatikov , and E. Witchel . Airavat: Security and privacy for MapReduce . In Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI) , April 2010 . I. Roy, S. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: Security and privacy for MapReduce. In Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI), April 2010."},{"unstructured":"M. Seaborn. Plash: Tools for practical least privilege. http:\/\/plast.beasts.org 2008.  M. Seaborn. Plash: Tools for practical least privilege. http:\/\/plast.beasts.org 2008.","key":"e_1_3_2_1_55_1"},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the 18th conference on USENIX security symposium. USENIX Association","author":"Singh K.","year":"2009","unstructured":"K. Singh , S. Bhola , and W. Lee . xBook: redesigning privacy control in social networking platforms . In Proceedings of the 18th conference on USENIX security symposium. USENIX Association , 2009 . K. Singh, S. Bhola, and W. Lee. xBook: redesigning privacy control in social networking platforms. In Proceedings of the 18th conference on USENIX security symposium. USENIX Association, 2009."},{"key":"e_1_3_2_1_57_1","volume-title":"USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Spahn R.","year":"2014","unstructured":"R. Spahn , J. Bell , M. Z. Lee , S. Bhamidipati , R. Geambasu , and G. Kaiser . Pebbles: Fine-grained data management abstractions for modern operating systems . In USENIX Symposium on Operating Systems Design and Implementation (OSDI) , 2014 . R. Spahn, J. Bell, M. Z. Lee, S. Bhamidipati, R. Geambasu, and G. Kaiser. Pebbles: Fine-grained data management abstractions for modern operating systems. In USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2014."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_58_1","DOI":"10.5555\/2372387.2372396"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_59_1","DOI":"10.1145\/2815400.2815417"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_60_1","DOI":"10.1145\/2342549.2342561"},{"key":"e_1_3_2_1_61_1","volume-title":"Usenix Security","author":"Wang T.","year":"2013","unstructured":"T. Wang , K. Lu , L. Lu , S. Chung , and W. Lee . Jekyll on ios: When benign apps become evil . In Usenix Security , 2013 . T. Wang, K. Lu, L. Lu, S. Chung, and W. Lee. Jekyll on ios: When benign apps become evil. In Usenix Security, 2013."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_62_1","DOI":"10.1145\/2741948.2741966"},{"key":"e_1_3_2_1_63_1","volume-title":"NSDI","author":"Yumerefendi A. R.","year":"2007","unstructured":"A. R. Yumerefendi , B. Mickle , and L. P. Cox . Tightlip: Keeping applications from spilling the beans . In NSDI , 2007 . A. R. Yumerefendi, B. Mickle, and L. P. Cox. Tightlip: Keeping applications from spilling the beans. In NSDI, 2007."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_64_1","DOI":"10.5555\/1298455.1298481"}],"event":{"sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGOPS ACM Special Interest Group on Operating Systems"],"acronym":"SoCC '16","name":"SoCC '16: ACM Symposium on Cloud Computing","location":"Santa Clara CA USA"},"container-title":["Proceedings of the Seventh ACM Symposium on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2987550.2987587","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2987550.2987587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:06Z","timestamp":1750218006000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2987550.2987587"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,5]]},"references-count":64,"alternative-id":["10.1145\/2987550.2987587","10.1145\/2987550"],"URL":"https:\/\/doi.org\/10.1145\/2987550.2987587","relation":{},"subject":[],"published":{"date-parts":[[2016,10,5]]},"assertion":[{"value":"2016-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}