{"id":"https://openalex.org/W2036354356","doi":"https://doi.org/10.1145/2714576.2714626","title":"AppPolicyModules","display_name":"AppPolicyModules","publication_year":2015,"publication_date":"2015-04-03","ids":{"openalex":"https://openalex.org/W2036354356","doi":"https://doi.org/10.1145/2714576.2714626","mag":"2036354356"},"language":"en","primary_location":{"id":"doi:10.1145/2714576.2714626","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2714576.2714626","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://hdl.handle.net/10446/57986","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072091905","display_name":"Enrico Bacis","orcid":"https://orcid.org/0000-0003-0688-7696"},"institutions":[{"id":"https://openalex.org/I11039511","display_name":"University of Bergamo","ror":"https://ror.org/02mbd5571","country_code":"IT","type":"education","lineage":["https://openalex.org/I11039511"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Enrico Bacis","raw_affiliation_strings":["Universit\u00e0 degli Studi di Bergamo, Dalmine, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 degli Studi di Bergamo, Dalmine, Italy","institution_ids":["https://openalex.org/I11039511"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042894190","display_name":"Simone Mutti","orcid":null},"institutions":[{"id":"https://openalex.org/I11039511","display_name":"University of Bergamo","ror":"https://ror.org/02mbd5571","country_code":"IT","type":"education","lineage":["https://openalex.org/I11039511"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Simone Mutti","raw_affiliation_strings":["Universit\u00e0 degli Studi di Bergamo, Dalmine, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 degli Studi di Bergamo, Dalmine, Italy","institution_ids":["https://openalex.org/I11039511"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026292704","display_name":"Stefano Paraboschi","orcid":"https://orcid.org/0000-0003-0399-1738"},"institutions":[{"id":"https://openalex.org/I11039511","display_name":"University of Bergamo","ror":"https://ror.org/02mbd5571","country_code":"IT","type":"education","lineage":["https://openalex.org/I11039511"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Stefano Paraboschi","raw_affiliation_strings":["Universit\u00e0 degli Studi di Bergamo, Dalmine, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 degli Studi di Bergamo, Dalmine, Italy","institution_ids":["https://openalex.org/I11039511"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5072091905"],"corresponding_institution_ids":["https://openalex.org/I11039511"],"apc_list":null,"apc_paid":null,"fwci":2.6056,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.90447213,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"309","last_page":"320"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7791472673416138},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7461962103843689},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.7038562297821045},{"id":"https://openalex.org/keywords/mandatory-access-control","display_name":"Mandatory access control","score":0.6714074611663818},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6516772508621216},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6371167898178101},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5817015767097473},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.31970351934432983},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.20954817533493042}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7791472673416138},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7461962103843689},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.7038562297821045},{"id":"https://openalex.org/C2777407602","wikidata":"https://www.wikidata.org/wiki/Q1888932","display_name":"Mandatory access control","level":4,"score":0.6714074611663818},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6516772508621216},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6371167898178101},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5817015767097473},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.31970351934432983},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.20954817533493042},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/2714576.2714626","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2714576.2714626","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:aisberg.unibg.it:10446/57986","is_oa":true,"landing_page_url":"http://hdl.handle.net/10446/57986","pdf_url":null,"source":{"id":"https://openalex.org/S4377196347","display_name":"Aisberg (University of Bergamo)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11039511","host_organization_name":"University of Bergamo","host_organization_lineage":["https://openalex.org/I11039511"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:zenodo.org:3495847","is_oa":true,"landing_page_url":"https://zenodo.org/record/3495847","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"}],"best_oa_location":{"id":"pmh:oai:aisberg.unibg.it:10446/57986","is_oa":true,"landing_page_url":"http://hdl.handle.net/10446/57986","pdf_url":null,"source":{"id":"https://openalex.org/S4377196347","display_name":"Aisberg (University of Bergamo)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11039511","host_organization_name":"University of Bergamo","host_organization_lineage":["https://openalex.org/I11039511"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7210799485","display_name":null,"funder_award_id":"644579","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"}],"funders":[{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W76706996","https://openalex.org/W190551272","https://openalex.org/W1963971515","https://openalex.org/W1965473749","https://openalex.org/W1979086041","https://openalex.org/W1989255032","https://openalex.org/W2059193037","https://openalex.org/W2066596410","https://openalex.org/W2116669623","https://openalex.org/W2167911131","https://openalex.org/W2399034518","https://openalex.org/W2399891510","https://openalex.org/W2405120356","https://openalex.org/W6667302004"],"related_works":["https://openalex.org/W2316685381","https://openalex.org/W3003485427","https://openalex.org/W2056388267","https://openalex.org/W4210309948","https://openalex.org/W2249350383","https://openalex.org/W2755037920","https://openalex.org/W2717179875","https://openalex.org/W4249118297","https://openalex.org/W2374393728","https://openalex.org/W4388923452"],"abstract_inverted_index":{"Android":[0,18,42],"has":[1,30],"recently":[2],"introduced":[3],"the":[4,17,23,34,45,48,54,60,79],"support":[5],"for":[6],"Mandatory":[7],"Access":[8,26],"Control,":[9],"which":[10],"extends":[11],"previous":[12],"security":[13],"services":[14],"relying":[15],"on":[16,22],"Permission":[19],"Framework":[20],"and":[21,38],"kernel-level":[24],"Discretionary":[25],"Control.":[27],"This":[28],"extension":[29,77],"been":[31],"obtained":[32],"with":[33,85,106],"use":[35,46],"of":[36,47,56,78],"SELinux":[37],"its":[39],"adaptation":[40],"to":[41,53,83,99],"(SEAndroid).":[43],"Currently,":[44],"MAC":[49,90],"model":[50],"is":[51],"limited":[52],"protection":[55],"system":[57],"resources.":[58],"All":[59],"apps":[61],"that":[62,81],"are":[63],"installed":[64],"by":[65],"users":[66],"fall":[67],"in":[68,93,97],"a":[69,88,94],"single":[70],"undifferentiated":[71],"domain,":[72],"untrusted_app.":[73],"We":[74],"propose":[75],"an":[76],"architecture":[80],"permits":[82],"associate":[84],"each":[86],"app":[87,101],"dedicated":[89,95],"policy,":[91],"contained":[92],"appPolicyModule,":[96],"order":[98],"protect":[100],"resources":[102],"even":[103],"from":[104],"malware":[105],"root":[107],"privileges.":[108]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":5}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2016-06-24T00:00:00"}
