{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:36:15Z","timestamp":1750221375515,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176311","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"256-266","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Multi-Enterprise Containerization Approach with an Interoperable Position-Based System"],"prefix":"10.1145","author":[{"given":"Oyindamola","family":"Oluwatimi","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/319344.319164"},{"volume-title":"STARBAC: Spatiotemporal role based access control. In On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA","year":"2007","author":"Aich Subhendu","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","unstructured":"Anne Anderson. 2004. XACML profile for role based access control (RBAC). OASIS Access Control TC committee draft 1 (2004) 13.  Anne Anderson. 2004. XACML profile for role based access control (RBAC). OASIS Access Control TC committee draft 1 (2004) 13."},{"key":"e_1_3_2_1_4_1","unstructured":"Android. {n. d.}. Android Developer's Guide. http:\/\/developer.android.com. ({n. d.}).  Android. {n. d.}. Android Developer's Guide. http:\/\/developer.android.com. ({n. d.})."},{"key":"e_1_3_2_1_5_1","unstructured":"Android. {n. d.}. Android Enterprise. https:\/\/enterprise.google.com\/android. ({n. d.}).  Android. {n. d.}. Android Enterprise. https:\/\/enterprise.google.com\/android. ({n. d.})."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517351.2517370"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063985"},{"volume-title":"Evaluating AAL Systems Through Competitive Benchmarking","author":"Bocca Maurizio","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39867-7_66"},{"volume-title":"International Symposium on Foundations and Practice of Security. Springer, 3--16","year":"2014","author":"Carrara Brent","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11581062_27"},{"volume-title":"Keysens: Passive user au- thentication through micro-behavior modeling of soft keyboard interaction. In Mobile Computing, Applications, and Services","year":"2013","author":"Draffin Benjamin","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33392-7_9"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197536"},{"volume-title":"International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services. Springer, 297--302","year":"2010","author":"Gupta Akhilesh","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.113"},{"volume-title":"The Evolution of the Conference Room and the Technology Behind it. http:\/\/cp.wainhouse.com\/ content\/evolution-conference-room. ({n. d.}).","author":"Haskins Bill","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861394"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2093973.2094018"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2012.50"},{"volume-title":"Telecommunications and Computer Networks (SoftCOM), 2014 22nd International Conference on. IEEE, 100--103","year":"2014","author":"Larchikov Andrey","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39653-6_25"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPIN.2012.6418917"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2014.160"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2914642.2914645"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2914642.2914648"},{"key":"e_1_3_2_1_28_1","unstructured":"Oyindamola Oluwatimi Daniele Midi and Elisa Bertino. 2016. Overview of Mobile Containerization Approaches and Open Research Directions. Under submission (2016).  Oyindamola Oluwatimi Daniele Midi and Elisa Bertino. 2016. Overview of Mobile Containerization Approaches and Open Research Directions. Under submission (2016)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818005"},{"key":"e_1_3_2_1_30_1","unstructured":"prontoly {n. d.}. ultrasonic handsfree authentication technology. http:\/\/www. prontoly.com\/. ({n. d.}).  prontoly {n. d.}. ultrasonic handsfree authentication technology. http:\/\/www. prontoly.com\/. ({n. d.})."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653712"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295140"},{"key":"e_1_3_2_1_33_1","first-page":"33","article-title":"Design and Performance Evaluation of Novel Location-Based Access Control Algorithm Using IEEE 802.11 r","volume":"10","author":"Saelim Thanathat","year":"2015","journal-title":"Journal of Convergence Information Technology"},{"key":"e_1_3_2_1_34_1","unstructured":"Holger Schulze. 2016. BYOD & Mobile Security 2016 Spotlight Report. http:\/\/crowdresearchpartners.com\/wp-content\/uploads\/2016\/03\/ BYOD-and-Mobile-Security-Report-2016.pdf. (March 2016).  Holger Schulze. 2016. BYOD & Mobile Security 2016 Spotlight Report. http:\/\/crowdresearchpartners.com\/wp-content\/uploads\/2016\/03\/ BYOD-and-Mobile-Security-Report-2016.pdf. (March 2016)."},{"key":"e_1_3_2_1_35_1","first-page":"150","article-title":"Context-based Access Control Systems for Mobile Devices. Dependable and Secure Computing","volume":"12","author":"Shebaro Bilal","year":"2015","journal-title":"IEEE Transactions on"},{"volume-title":"Identidroid: Android can finally wear its anonymous suit. TRANSACTIONS ON DATA PRIVACY 7","year":"2014","author":"Shebaro Bilal","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/10803548.2013.11076978"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790093"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2442956"}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Tempe AZ USA","acronym":"CODASPY '18"},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176311","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176311","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176311"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":39,"alternative-id":["10.1145\/3176258.3176311","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176311","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}