{"id":"https://openalex.org/W2473529680","doi":"https://doi.org/10.1007/978-3-319-31550-8_14","title":"RbacIP: A RBAC-Based Method for Intercepting and Processing Malicious Applications in Android Platform","display_name":"RbacIP: A RBAC-Based Method for Intercepting and Processing Malicious Applications in Android Platform","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2473529680","doi":"https://doi.org/10.1007/978-3-319-31550-8_14","mag":"2473529680"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-31550-8_14","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-31550-8_14","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100412901","display_name":"Lin Li","orcid":"https://orcid.org/0000-0002-8014-8296"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Li Lin","raw_affiliation_strings":["Beijing Key Laboratory of Trusted Computing, Beijing, China","College of Computer Science, Beijing University of Technology, Beijing, China","National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Trusted Computing, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"College of Computer Science, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]},{"raw_affiliation_string":"National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072528272","display_name":"Jian Ni","orcid":"https://orcid.org/0000-0002-0398-7838"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Ni","raw_affiliation_strings":["Beijing Key Laboratory of Trusted Computing, Beijing, China","College of Computer Science, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Trusted Computing, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"College of Computer Science, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100848176","display_name":"Jian Hu","orcid":"https://orcid.org/0009-0008-6044-8882"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Hu","raw_affiliation_strings":["Beijing Key Laboratory of Trusted Computing, Beijing, China","College of Computer Science, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Trusted Computing, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"College of Computer Science, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034822825","display_name":"Jianbiao Zhang","orcid":"https://orcid.org/0000-0002-4917-7996"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianbiao Zhang","raw_affiliation_strings":["Beijing Key Laboratory of Trusted Computing, Beijing, China","College of Computer Science, Beijing University of Technology, Beijing, China","Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China","National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Trusted Computing, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"College of Computer Science, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]},{"raw_affiliation_string":"Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]},{"raw_affiliation_string":"National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100412901"],"corresponding_institution_ids":["https://openalex.org/I37796252"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06350975,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"214","last_page":"225"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8210546374320984},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8151044845581055},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.6118948459625244},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5071451663970947},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5036367774009705},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5014429092407227},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.43797633051872253},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.42710408568382263},{"id":"https://openalex.org/keywords/linux-kernel","display_name":"Linux kernel","score":0.4173915982246399},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.41076967120170593},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.39832988381385803}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8210546374320984},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8151044845581055},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.6118948459625244},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5071451663970947},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5036367774009705},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5014429092407227},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.43797633051872253},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.42710408568382263},{"id":"https://openalex.org/C553261973","wikidata":"https://www.wikidata.org/wiki/Q14579","display_name":"Linux kernel","level":2,"score":0.4173915982246399},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.41076967120170593},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.39832988381385803},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-31550-8_14","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-31550-8_14","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.5699999928474426,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1980176849","https://openalex.org/W2003748004","https://openalex.org/W2015933956","https://openalex.org/W2024071684","https://openalex.org/W2056690037","https://openalex.org/W2084939909","https://openalex.org/W2085301524","https://openalex.org/W2086382580","https://openalex.org/W2092688436","https://openalex.org/W2132960674","https://openalex.org/W2133800883","https://openalex.org/W2138412763","https://openalex.org/W2151823662","https://openalex.org/W2613384225","https://openalex.org/W2911976451","https://openalex.org/W2913524493","https://openalex.org/W2914584834","https://openalex.org/W2914846526"],"related_works":["https://openalex.org/W2439951656","https://openalex.org/W1573526548","https://openalex.org/W1998188341","https://openalex.org/W2610659201","https://openalex.org/W65788704","https://openalex.org/W4285507391","https://openalex.org/W4360982091","https://openalex.org/W3176864451","https://openalex.org/W2067547021","https://openalex.org/W2765174411"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
