{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T08:42:48Z","timestamp":1725698568937},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/ccis.2012.6664265","type":"proceedings-article","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T16:48:02Z","timestamp":1385570882000},"page":"701-705","source":"Crossref","is-referenced-by-count":5,"title":["A security assessment method for Android applications based on permission model"],"prefix":"10.1109","author":[{"given":"Danyang","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Xiangling","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Maoqiang","family":"Song","sequence":"additional","affiliation":[]},{"given":"Yidong","family":"Cui","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1328854.1328855"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2001.989592"},{"journal-title":"MIPRO 2011 Proceedings of the 34th International Convention","article-title":"Emerging security threats for mobile platforms","year":"2011","author":"delac","key":"11"},{"journal-title":"IEEE","article-title":"Various approaches in analyzing android applications with its permission-based security models","year":"2011","author":"tanahashi","key":"12"},{"journal-title":"Mobile Malware Development Continues to Rise Android Leads the Way","year":"2011","key":"3"},{"journal-title":"Privilege Escalation Attacks on Android Information Security","first-page":"346","year":"2011","author":"davi","key":"2"},{"journal-title":"IEEE","article-title":"Understanding android security","year":"2009","author":"william enck","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"journal-title":"ACM","article-title":"Porscha: Policy oriented secure content handling in android","year":"2010","author":"machigar ongtang","key":"7"},{"journal-title":"Mobile Device Security","article-title":"Google android a comprehensive security assessment","year":"2010","author":"asaf shabtai","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.39"},{"journal-title":"Proceedings of the 20th USENIX Security Symposium","article-title":"A study of android application security","year":"2010","author":"william enck","key":"4"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1145\/1755688.1755732","article-title":"Apex: Extending android permission model and enforcement with user-defined runtime constraints","author":"nauman","year":"2010","journal-title":"10 Proceedings of the 5th ACM Symposium on Information Computer and Communications Security"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"}],"event":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems (CCIS)","start":{"date-parts":[[2012,10,30]]},"location":"Hangzhou, China","end":{"date-parts":[[2012,11,1]]}},"container-title":["2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6637132\/6664224\/06664265.pdf?arnumber=6664265","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,17]],"date-time":"2022-03-17T17:29:24Z","timestamp":1647538164000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6664265\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":14,"URL":"http:\/\/dx.doi.org\/10.1109\/ccis.2012.6664265","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}