{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:27:19Z","timestamp":1759134439983,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T00:00:00Z","timestamp":1496793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ARL CRA","award":["W911NF-13-2-0045"],"award-info":[{"award-number":["W911NF-13-2-0045"]}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1408880","CNS-1408801"],"award-info":[{"award-number":["CNS-1408880","CNS-1408801"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,7]]},"DOI":"10.1145\/3078861.3078872","type":"proceedings-article","created":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T19:31:40Z","timestamp":1496259100000},"page":"31-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["On Risk in Access Control Enforcement"],"prefix":"10.1145","author":[{"given":"Giuseppe","family":"Petracca","sequence":"first","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Frank","family":"Capobianco","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Christian","family":"Skalka","sequence":"additional","affiliation":[{"name":"University of Vermont, Burlington, VT, USA"}]},{"given":"Trent","family":"Jaeger","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android UI\/Application Exerciser. https:\/\/developer.android.com\/studio\/test\/monkey.html.  Android UI\/Application Exerciser. https:\/\/developer.android.com\/studio\/test\/monkey.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Compatibility Test Suite - Android Open Source Project. https:\/\/source.android.com\/compatibility\/cts\/.  Compatibility Test Suite - Android Open Source Project. https:\/\/source.android.com\/compatibility\/cts\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Tresys. SETools - Policy Anakysis Tools for SELinux. https:\/\/github.com\/TresysTechnology\/setools3\/wiki.  Tresys. SETools - Policy Anakysis Tools for SELinux. https:\/\/github.com\/TresysTechnology\/setools3\/wiki."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Sepehr Amir-Mohammadian Stephen Chong and Christian Skalka. 2016. Correct Audit Logging: Theory and Practice. In Principles of Security and Trust (POST).  Sepehr Amir-Mohammadian Stephen Chong and Christian Skalka. 2016. Correct Audit Logging: Theory and Practice. In Principles of Security and Trust (POST).","DOI":"10.1007\/978-3-662-49635-0_8"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993600.2993610"},{"volume-title":"IEEE Conference on Communications and Network Security. 462--469","author":"Bijon Khalid Zaman","key":"e_1_3_2_1_9_1","unstructured":"Khalid Zaman Bijon , Ram Krishnan , and Ravi S. Sandhu . 2013. A framework for risk-aware role based access control . In IEEE Conference on Communications and Network Security. 462--469 . Khalid Zaman Bijon, Ram Krishnan, and Ravi S. Sandhu. 2013. A framework for risk-aware role based access control. In IEEE Conference on Communications and Network Security. 462--469."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium (NDSS).","author":"Chen Hong","year":"2009","unstructured":"Hong Chen , Ninghui Li , and Ziqing Mao . 2009 . Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems . In Proceedings of the Network and Distributed Systems Security Symposium (NDSS). Hong Chen, Ninghui Li, and Ziqing Mao. 2009. Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems. In Proceedings of the Network and Distributed Systems Security Symposium (NDSS)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29963-6_11"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488407"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.21"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187879"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586141"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 9th USENIX conference on Operating systems design and implementation.","author":"W. Enck","year":"2010","unstructured":"W. Enck et al. 2010 . TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones . In Proceedings of the 9th USENIX conference on Operating systems design and implementation. W. Enck et al. 2010. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_21_1","volume-title":"Security Analysis of Emerging Smart Home Applications. In IEEE Symposium on Security and Privacy. 636--654","author":"Fernandes Earlence","year":"2016","unstructured":"Earlence Fernandes , Jaeyeon Jung , and Atul Prakash . 2016 . Security Analysis of Emerging Smart Home Applications. In IEEE Symposium on Security and Privacy. 636--654 . Earlence Fernandes, Jaeyeon Jung, and Atul Prakash. 2016. Security Analysis of Emerging Smart Home Applications. In IEEE Symposium on Security and Privacy. 636--654."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102164"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.34"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.54"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028100"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/54289.871709"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the USENIX Annual Technical Conference. USENIX Association","author":"Hicks Boniface","year":"2007","unstructured":"Boniface Hicks , Sandra Rueda , Trent Jaeger , and Patrick McDaniel . 2007 . From trusted to secure: building and executing applications that enforce system security . In Proceedings of the USENIX Annual Technical Conference. USENIX Association , Berkeley, CA, USA, 1--14. Boniface Hicks, Sandra Rueda, Trent Jaeger, and Patrick McDaniel. 2007. From trusted to secure: building and executing applications that enforce system security. In Proceedings of the USENIX Annual Technical Conference. USENIX Association, Berkeley, CA, USA, 1--14."},{"volume-title":"Proceedings of the 12th USENIX Security Symposium. 59--74","author":"Jaeger T.","key":"e_1_3_2_1_28_1","unstructured":"T. Jaeger , R. Sailer , and X. Zhang . 2003. Analyzing Integrity Protection in the SELinux Example Policy . In Proceedings of the 12th USENIX Security Symposium. 59--74 . T. Jaeger, R. Sailer, and X. Zhang. 2003. Analyzing Integrity Protection in the SELinux Example Policy. In Proceedings of the 12th USENIX Security Symposium. 59--74."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23051"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557549"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.41"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375606"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382215"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15618-7_14"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/269005.266669"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755719"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium. 527--542","author":"Pandita Rahul","year":"2013","unstructured":"Rahul Pandita , Xusheng Xiao , Wei Yang , William Enck , and Tao Xie . 2013 . WHYPER: Towards Automating Risk Assessment of Mobile Applications . In Proceedings of the 22nd USENIX Security Symposium. 527--542 . Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie. 2013. WHYPER: Towards Automating Risk Assessment of Mobile Applications. In Proceedings of the 22nd USENIX Security Symposium. 527--542."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818005"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation.","author":"Roy Indrajit","year":"2010","unstructured":"Indrajit Roy , Srinath T. V. Setty , Ann Kilzer , Vitaly Shmatikov , and Emmett Witchel . 2010 . Airavat: Security and Privacy for MapReduce . In Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation. Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vitaly Shmatikov, and Emmett Witchel. 2010. Airavat: Security and Privacy for MapReduce. In Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.11"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048146"},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the 20th Annual Network and Distributed System Security Symposium.","author":"Son Sooel","year":"2013","unstructured":"Sooel Son , Kathryn S. McKinley , and Vitaly Shmatikov . 2013 . Fix Me Up: Repairing Access-Control Bugs in Web Applications . In Proceedings of the 20th Annual Network and Distributed System Security Symposium. Sooel Son, Kathryn S. McKinley, and Vitaly Shmatikov. 2013. Fix Me Up: Repairing Access-Control Bugs in Web Applications. In Proceedings of the 20th Annual Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_46_1","unstructured":"Lin Tan Xiaolan Zhang Xiao Ma Weiwei Xiong and Yuanyuan Zhou. 2008. AutoISES: automatically inferring security specifications and detecting violations. In USENIX Security.   Lin Tan Xiaolan Zhang Xiao Ma Weiwei Xiong and Yuanyuan Zhou. 2008. AutoISES: automatically inferring security specifications and detecting violations. In USENIX Security."},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium.","author":"Vijayakumar Hayawardh","year":"2014","unstructured":"Hayawardh Vijayakumar , Xinyang Ge , Mathias Payer , and Trent Jaeger . 2014 . JIGSAW: Protecting Resource Access by Inferring Programmer Expectations . In Proceedings of the 23rd USENIX Security Symposium. Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, and Trent Jaeger. 2014. JIGSAW: Protecting Resource Access by Inferring Programmer Expectations. In Proceedings of the 23rd USENIX Security Symposium."},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the 5th IEEE Symposium on Configuration Analytics and Automation (SafeConfig","author":"Vijayakumar Hayawardh","year":"2012","unstructured":"Hayawardh Vijayakumar and Trent Jaeger . 2012 . The Right Files at the Right Time . In Proceedings of the 5th IEEE Symposium on Configuration Analytics and Automation (SafeConfig 2012). Hayawardh Vijayakumar and Trent Jaeger. 2012. The Right Files at the Right Time. In Proceedings of the 5th IEEE Symposium on Configuration Analytics and Automation (SafeConfig 2012)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414500"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660341"}],"event":{"name":"SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Indianapolis Indiana USA","acronym":"SACMAT'17"},"container-title":["Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078872","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3078872","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3078872","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:09Z","timestamp":1750215789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078872"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,7]]},"references-count":47,"alternative-id":["10.1145\/3078861.3078872","10.1145\/3078861"],"URL":"https:\/\/doi.org\/10.1145\/3078861.3078872","relation":{},"subject":[],"published":{"date-parts":[[2017,6,7]]},"assertion":[{"value":"2017-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}