{"id":"https://openalex.org/W1986330503","doi":"https://doi.org/10.1145/1866307.1866317","title":"A methodology for empirical analysis of permission-based security models and its application to android","display_name":"A methodology for empirical analysis of permission-based security models and its application to android","publication_year":2010,"publication_date":"2010-10-04","ids":{"openalex":"https://openalex.org/W1986330503","doi":"https://doi.org/10.1145/1866307.1866317","mag":"1986330503"},"language":"en","primary_location":{"id":"doi:10.1145/1866307.1866317","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1866307.1866317","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM conference on Computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101557702","display_name":"David Barrera","orcid":"https://orcid.org/0000-0003-2319-9916"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"David Barrera","raw_affiliation_strings":["Carleton University, Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014127435","display_name":"H. G\u00fcne\u015f Kayac\u0131k","orcid":null},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"H. G\u00fcne\u015f Kayacik","raw_affiliation_strings":["Carleton University, Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011846293","display_name":"Paul C. van Oorschot","orcid":"https://orcid.org/0000-0002-5038-5370"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Paul C. van Oorschot","raw_affiliation_strings":["Carleton University, Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111980259","display_name":"Anil Somayaji","orcid":"https://orcid.org/0000-0003-4761-9743"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Anil Somayaji","raw_affiliation_strings":["Carleton University, Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I67031392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101557702"],"corresponding_institution_ids":["https://openalex.org/I67031392"],"apc_list":null,"apc_paid":null,"fwci":43.4651,"has_fulltext":false,"cited_by_count":489,"citation_normalized_percentile":{"value":0.99955323,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"73","last_page":"84"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.9888468980789185},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8029484748840332},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.70579594373703},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.6169285774230957},{"id":"https://openalex.org/keywords/granularity","display_name":"Granularity","score":0.47291430830955505},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4723148047924042},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.4425402879714966},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.40126684308052063},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32505691051483154},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09977063536643982},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0798477828502655}],"concepts":[{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.9888468980789185},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8029484748840332},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.70579594373703},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.6169285774230957},{"id":"https://openalex.org/C177774035","wikidata":"https://www.wikidata.org/wiki/Q1246948","display_name":"Granularity","level":2,"score":0.47291430830955505},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4723148047924042},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.4425402879714966},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40126684308052063},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32505691051483154},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09977063536643982},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0798477828502655},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/1866307.1866317","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1866307.1866317","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM conference on Computer and communications security","raw_type":"proceedings-article"},{"id":"pmh:oai:researchonline.gcu.ac.uk:openaire_cris_publications/7a8ad122-8b7e-4068-8219-f175706cc955","is_oa":false,"landing_page_url":"https://researchonline.gcu.ac.uk/en/publications/7a8ad122-8b7e-4068-8219-f175706cc955","pdf_url":null,"source":{"id":"https://openalex.org/S4306402566","display_name":"ResearchOnline (Glasgow Caledonian University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I195939026","host_organization_name":"Glasgow Caledonian University","host_organization_lineage":["https://openalex.org/I195939026"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Barrera, D, Kayacik, H G, Van Oorschot, P & Somayaji, A 2010, A methodology for empirical analysis of permission-based security models and its application to android. in Proceedings of the 17th ACM conference on Computer and Communications Security (CCS'10). Association for Computing Machinery (ACM), pp. 73-84, 17th ACM Conference on Computer and Communications Security , Chicago, Illinois, United States, 4/10/10. https://doi.org/10.1145/1866307.1866317","raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:publications.polymtl.ca:38104","is_oa":false,"landing_page_url":"https://publications.polymtl.ca/38104/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401013","display_name":"PolyPublie (\u00c9cole Polytechnique de Montr\u00e9al)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45683168","host_organization_name":"Polytechnique Montr\u00e9al","host_organization_lineage":["https://openalex.org/I45683168"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Communication de conf\u00e9rence"},{"id":"pmh:oai:researchonline.gcu.ac.uk:publications/7a8ad122-8b7e-4068-8219-f175706cc955","is_oa":false,"landing_page_url":"http://www.scopus.com/inward/record.url?eid=2-s2.0-78649990344&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4306402566","display_name":"ResearchOnline (Glasgow Caledonian University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I195939026","host_organization_name":"Glasgow Caledonian University","host_organization_lineage":["https://openalex.org/I195939026"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Barrera, D, Kayacik, H G, Van Oorschot, P & Somayaji, A 2010, A methodology for empirical analysis of permission-based security models and its application to android. in Proceedings of the 17th ACM conference on Computer and Communications Security (CCS'10). Association for Computing Machinery (ACM), pp. 73-84, 17th ACM Conference on Computer and Communications Security , Chicago, Illinois, United States, 4/10/10. https://doi.org/10.1145/1866307.1866317","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320309370","display_name":"University of Pennsylvania","ror":"https://ror.org/00b30xv10"},{"id":"https://openalex.org/F4320320994","display_name":"Canada Research Chairs","ror":"https://ror.org/0517h6h17"},{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W166105494","https://openalex.org/W259338706","https://openalex.org/W1598325486","https://openalex.org/W1679913846","https://openalex.org/W2003276999","https://openalex.org/W2045020574","https://openalex.org/W2089775818","https://openalex.org/W2101834106","https://openalex.org/W2105877490","https://openalex.org/W2121221235","https://openalex.org/W2140190241","https://openalex.org/W3036846224","https://openalex.org/W4211218509","https://openalex.org/W4245176872","https://openalex.org/W6635748211","https://openalex.org/W6680704940"],"related_works":["https://openalex.org/W2316685381","https://openalex.org/W2056388267","https://openalex.org/W2249350383","https://openalex.org/W2072937473","https://openalex.org/W4210309948","https://openalex.org/W4388923452","https://openalex.org/W3211901564","https://openalex.org/W2786416059","https://openalex.org/W2070518775","https://openalex.org/W609672658"],"abstract_inverted_index":{"Permission-based":[0],"security":[1,43],"models":[2,44],"provide":[3],"controlled":[4],"access":[5,28],"to":[6,65,112],"various":[7],"system":[8],"resources.":[9],"The":[10],"expressiveness":[11,114],"of":[12,25,41,49,55,69,83,88,104,122],"the":[13,22,38,50,59,107,119],"permission":[14,109],"set":[15],"plays":[16],"an":[17],"important":[18],"role":[19],"in":[20,27],"providing":[21],"right":[23],"level":[24],"granularity":[26],"control.":[29],"In":[30],"this":[31],"work,":[32],"we":[33,71],"present":[34,93],"a":[35,66,77],"methodology":[36,61,81],"for":[37,86,106],"empirical":[39,95],"analysis":[40],"permission-based":[42,89],"which":[45],"makes":[46],"novel":[47],"use":[48],"Self-Organizing":[51],"Map":[52],"(SOM)":[53],"algorithm":[54],"Kohonen":[56],"(2001).":[57],"While":[58],"proposed":[60],"may":[62],"be":[63],"applicable":[64],"wide":[67],"range":[68],"architectures,":[70],"analyze":[72],"1,100":[73],"Android":[74,108],"applications":[75],"as":[76],"case":[78],"study.":[79],"Our":[80],"is":[82],"independent":[84],"interest":[85],"visualization":[87],"systems":[90],"beyond":[91],"our":[92],"Android-specific":[94],"analysis.":[96],"We":[97],"offer":[98],"some":[99],"discussion":[100],"identifying":[101],"potential":[102],"points":[103],"improvement":[105],"model":[110],"attempting":[111],"increase":[113],"where":[115],"needed":[116],"without":[117],"increasing":[118],"total":[120],"number":[121],"permissions":[123],"or":[124],"overall":[125],"complexity.":[126]},"counts_by_year":[{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":17},{"year":2021,"cited_by_count":21},{"year":2020,"cited_by_count":21},{"year":2019,"cited_by_count":25},{"year":2018,"cited_by_count":36},{"year":2017,"cited_by_count":42},{"year":2016,"cited_by_count":53},{"year":2015,"cited_by_count":59},{"year":2014,"cited_by_count":60},{"year":2013,"cited_by_count":65},{"year":2012,"cited_by_count":40}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
