{"id":"https://openalex.org/W2418861874","doi":"https://doi.org/10.1145/2914642.2914645","title":"An Application Restriction System for Bring-Your-Own-Device Scenarios","display_name":"An Application Restriction System for Bring-Your-Own-Device Scenarios","publication_year":2016,"publication_date":"2016-06-06","ids":{"openalex":"https://openalex.org/W2418861874","doi":"https://doi.org/10.1145/2914642.2914645","mag":"2418861874"},"language":"en","primary_location":{"id":"doi:10.1145/2914642.2914645","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2914642.2914645","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044512882","display_name":"Oyindamola Oluwatimi","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Oyindamola Oluwatimi","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061694501","display_name":"Elisa Bertino","orcid":"https://orcid.org/0000-0002-4029-7051"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Elisa Bertino","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5044512882"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":0.7565,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.70763368,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"25","last_page":"36"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/persona","display_name":"Persona","score":0.6935734748840332},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.685819149017334},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6502100229263306},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.6088100671768188},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5543102622032166},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4413597881793976},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4116983711719513},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3911224901676178},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.33338773250579834},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.20061782002449036}],"concepts":[{"id":"https://openalex.org/C313442","wikidata":"https://www.wikidata.org/wiki/Q778556","display_name":"Persona","level":2,"score":0.6935734748840332},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.685819149017334},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6502100229263306},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.6088100671768188},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5543102622032166},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4413597881793976},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4116983711719513},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3911224901676178},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.33338773250579834},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.20061782002449036},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2914642.2914645","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2914642.2914645","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","score":0.4699999988079071,"display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W32581813","https://openalex.org/W87210284","https://openalex.org/W146651671","https://openalex.org/W1977950655","https://openalex.org/W1988506816","https://openalex.org/W2046071314","https://openalex.org/W2050379150","https://openalex.org/W2050618934","https://openalex.org/W2053008565","https://openalex.org/W2060692877","https://openalex.org/W2070881494","https://openalex.org/W2071717677","https://openalex.org/W2105412867","https://openalex.org/W2140095007","https://openalex.org/W2153497135","https://openalex.org/W2158888459","https://openalex.org/W2166746933","https://openalex.org/W2341282470","https://openalex.org/W2541878300","https://openalex.org/W2588227557","https://openalex.org/W3136699861"],"related_works":["https://openalex.org/W2795366572","https://openalex.org/W2886588594","https://openalex.org/W3005214328","https://openalex.org/W2920961600","https://openalex.org/W3091061106","https://openalex.org/W2610743940","https://openalex.org/W1513171822","https://openalex.org/W4312802148","https://openalex.org/W4285553851","https://openalex.org/W1565885216"],"abstract_inverted_index":{"Different":[0],"containerization":[1],"techniques":[2],"have":[3,201,206],"been":[4],"developed":[5],"to":[6,33,51,65,84,94,111,119,156,165,180,203],"ensure":[7],"the":[8,21,24,42,47,63,67,75,91,98,109,132,166,172,187,213],"separation":[9],"of":[10,69,88,134,174],"enterprise":[11,22,48],"content":[12,49],"and":[13,100,182,195,209,226],"personal":[14],"data":[15,181,194],"on":[16,41,90,97,123],"an":[17,175],"end-user's":[18],"device.":[19],"Although":[20],"manages":[23],"environment":[25],"in":[26,74,106],"which":[27],"work-related":[28],"activities":[29],"are":[30],"conducted,":[31],"referred":[32],"as":[34,120],"a":[35,86,193],"work":[36,76,188],"persona,":[37],"third-party":[38,70],"applications":[39,71,81,110,136],"installed":[40,96,162],"mobile":[43,79,135],"devices":[44],"may":[45],"make":[46],"vulnerable":[50],"misuse":[52],"or":[53],"exfiltration.":[54],"It":[55],"is":[56,143,192,224],"thus":[57],"critical":[58],"that":[59,72,116,153,221],"enterprises":[60],"be":[61,104,112],"given":[62],"ability":[64],"restrict":[66,131],"capabilities":[68,89,102,133,173],"reside":[73],"persona.":[77,189],"In":[78],"systems,":[80],"typically":[82],"request":[83],"use":[85],"list":[87],"device":[92],"prior":[93],"being":[95],"device,":[99],"alll":[101],"must":[103],"granted":[105],"order":[107],"for":[108,160],"installed.":[113],"Our":[114,217],"approach,":[115],"we":[117,200],"refer":[118],"DroidARM,":[121],"focuses":[122],"post-installation":[124],"application":[125,140,176],"restriction":[126,141],"policies.":[127],"Such":[128],"policies":[129],"dynamically":[130],"at":[137],"run-time.":[138],"An":[139],"policy":[142],"configured":[144],"through":[145],"our":[146,168,222],"Application":[147],"Restriction":[148],"Manager":[149,152],"(ARM)":[150],"Policy":[151],"allows":[154],"one":[155],"set":[157],"different":[158],"restrictions":[159],"each":[161],"application.":[163],"Adhering":[164],"policy,":[167],"ARM":[169],"system":[170,183,196],"limits":[171],"by":[177],"restricting":[178],"access":[179],"resources":[184],"contained":[185],"within":[186],"Data":[190],"shadowing":[191],"resource":[197],"protection":[198],"technique":[199],"chosen":[202],"leverage.":[204],"We":[205],"implemented":[207],"DroidARM":[208],"integrated":[210],"it":[211],"into":[212],"Android":[214],"operating":[215],"system.":[216],"experimental":[218],"results":[219],"show":[220],"approach":[223],"efficient":[225],"effective.":[227]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
