{"id":"https://openalex.org/W1816830249","doi":"https://doi.org/10.3233/jcs-2009-0387","title":"Verifying resource access control on mobile interactive devices","display_name":"Verifying resource access control on mobile interactive devices","publication_year":2010,"publication_date":"2010-09-20","ids":{"openalex":"https://openalex.org/W1816830249","doi":"https://doi.org/10.3233/jcs-2009-0387","mag":"1816830249"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-2009-0387","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-2009-0387","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://inria.hal.science/inria-00537821","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035021429","display_name":"Fr\u00e9d\u00e9ric Besson","orcid":"https://orcid.org/0000-0001-6815-0652"},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Fr\u00e9d\u00e9ric Besson","raw_affiliation_strings":["Inria Rennes, Campus de Beaulieu, Rennes Cedex, France","INRIA Rennes, Campus de Beaulieu, Rennes Cedex, France"],"affiliations":[{"raw_affiliation_string":"Inria Rennes, Campus de Beaulieu, Rennes Cedex, France","institution_ids":[]},{"raw_affiliation_string":"INRIA Rennes, Campus de Beaulieu, Rennes Cedex, France","institution_ids":["https://openalex.org/I1326498283"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040992818","display_name":"Guillaume Dufay","orcid":null},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Guillaume Dufay","raw_affiliation_strings":["Inria Rennes, Campus de Beaulieu, Rennes Cedex, France","Trusted Labs, Versailles, France","Inria Rennes, Campus de Beaulieu, Rennes Cedex, France and Trusted Labs, Versailles, France"],"affiliations":[{"raw_affiliation_string":"Inria Rennes, Campus de Beaulieu, Rennes Cedex, France","institution_ids":[]},{"raw_affiliation_string":"Trusted Labs, Versailles, France","institution_ids":[]},{"raw_affiliation_string":"Inria Rennes, Campus de Beaulieu, Rennes Cedex, France and Trusted Labs, Versailles, France","institution_ids":["https://openalex.org/I1326498283"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054819541","display_name":"Thomas Wiben Jensen","orcid":"https://orcid.org/0000-0003-1428-4414"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I56067802","display_name":"Universit\u00e9 de Rennes","ror":"https://ror.org/015m7wh34","country_code":"FR","type":"education","lineage":["https://openalex.org/I56067802"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Thomas Jensen","raw_affiliation_strings":["CNRS, Campus de Beaulieu, Rennes Cedex, France"],"affiliations":[{"raw_affiliation_string":"CNRS, Campus de Beaulieu, Rennes Cedex, France","institution_ids":["https://openalex.org/I56067802","https://openalex.org/I1294671590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046752375","display_name":"David Pichardie","orcid":"https://orcid.org/0000-0002-2504-1760"},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"David Pichardie","raw_affiliation_strings":["Inria Rennes, Campus de Beaulieu, Rennes Cedex, France","(Correspd. E-mail: david.pichardie@irisa.fr) Inria Rennes, Campus de Beaulieu, Rennes Cedex, France#TAB#"],"affiliations":[{"raw_affiliation_string":"Inria Rennes, Campus de Beaulieu, Rennes Cedex, France","institution_ids":[]},{"raw_affiliation_string":"(Correspd. E-mail: david.pichardie@irisa.fr) Inria Rennes, Campus de Beaulieu, Rennes Cedex, France#TAB#","institution_ids":["https://openalex.org/I1326498283"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5046752375"],"corresponding_institution_ids":["https://openalex.org/I1326498283"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.06795078,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"18","issue":"6","first_page":"971","last_page":"998"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8488411903381348},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.8436703681945801},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7607049942016602},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.6604810357093811},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.5804848670959473},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.5449345111846924},{"id":"https://openalex.org/keywords/discretionary-access-control","display_name":"Discretionary access control","score":0.5228652954101562},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.5227254033088684},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.4609660804271698},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4176560044288635},{"id":"https://openalex.org/keywords/ask-price","display_name":"Ask price","score":0.414335697889328},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.40796738862991333},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.345784991979599},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.32509544491767883},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.16815251111984253}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8488411903381348},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.8436703681945801},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7607049942016602},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.6604810357093811},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.5804848670959473},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.5449345111846924},{"id":"https://openalex.org/C48814466","wikidata":"https://www.wikidata.org/wiki/Q1228590","display_name":"Discretionary access control","level":4,"score":0.5228652954101562},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.5227254033088684},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.4609660804271698},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4176560044288635},{"id":"https://openalex.org/C90329073","wikidata":"https://www.wikidata.org/wiki/Q914232","display_name":"Ask price","level":2,"score":0.414335697889328},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.40796738862991333},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.345784991979599},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.32509544491767883},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.16815251111984253},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3233/jcs-2009-0387","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-2009-0387","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.138.114","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.114","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.irisa.fr/lande/pichardie/papers/jcs08.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.154.9824","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.9824","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.irisa.fr/lande/pichardie/papers/jcs10.pdf","raw_type":"text"},{"id":"pmh:oai:HAL:inria-00537821v1","is_oa":true,"landing_page_url":"https://inria.hal.science/inria-00537821","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Computer Security, 2010, 18 (6), pp.971-998","raw_type":"Journal articles"}],"best_oa_location":{"id":"pmh:oai:HAL:inria-00537821v1","is_oa":true,"landing_page_url":"https://inria.hal.science/inria-00537821","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Computer Security, 2010, 18 (6), pp.971-998","raw_type":"Journal articles"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320320883","display_name":"Agence Nationale de la Recherche","ror":"https://ror.org/00rbzpz17"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1479723338","https://openalex.org/W1479733905","https://openalex.org/W1535183500","https://openalex.org/W1536882458","https://openalex.org/W1553894716","https://openalex.org/W1652096249","https://openalex.org/W1771118579","https://openalex.org/W1827592073","https://openalex.org/W1991206705","https://openalex.org/W2004048608","https://openalex.org/W2027099721","https://openalex.org/W2034711041","https://openalex.org/W2040152339","https://openalex.org/W2065076704","https://openalex.org/W2104152314","https://openalex.org/W2106830965","https://openalex.org/W2139960707","https://openalex.org/W2154374619","https://openalex.org/W2168526962","https://openalex.org/W2708901938","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2373984226","https://openalex.org/W2349137515","https://openalex.org/W2130613250","https://openalex.org/W2361337511","https://openalex.org/W2358774039","https://openalex.org/W1513229083","https://openalex.org/W2353815999","https://openalex.org/W4390864104","https://openalex.org/W2364540050","https://openalex.org/W2374393728"],"abstract_inverted_index":{"A":[0,111,124],"model":[1,25,45,71],"of":[2,65,87],"resource":[3],"access":[4,11,49,108],"control":[5,12,50,74],"is":[6,26,119,131],"presented":[7],"in":[8,37,54],"which":[9,114],"the":[10,21,32,43,88,116,129],"to":[13,19,46,56,58,92,107],"resources":[14],"can":[15],"employ":[16],"user":[17],"interaction":[18],"obtain":[20],"necessary":[22],"permissions.":[23],"This":[24],"inspired":[27],"by":[28],"and":[29,82,121],"improves":[30],"on":[31,73],"Java":[33,44],"security":[34,90,117],"architecture":[35],"used":[36],"Java-enabled":[38],"mobile":[39],"telephones.":[40],"We":[41,67],"extend":[42],"incl":[47],"ude":[48],"permissions":[51],"with":[52,78],"multiplicities":[53],"order":[55],"allow":[57],"use":[59],"a":[60,62,69,84,102,109],"permission":[61,103],"certain":[63],"number":[64],"times.":[66],"define":[68],"program":[70],"based":[72],"flow":[75],"graphs":[76],"together":[77],"its":[79],"operational":[80],"semantics":[81],"provide":[83],"formal":[85],"definition":[86],"basic":[89],"policy":[91,118],"enforce":[93],"viz":[94],"that":[95],"an":[96],"application":[97],"will":[98],"always":[99],"ask":[100],"for":[101],"before":[104],"using":[105],"it":[106],"resource.":[110],"static":[112],"analysis":[113,130],"enforces":[115],"defined":[120],"proved":[122],"correct.":[123],"constraint":[125],"solving":[126],"algorithm":[127],"implementing":[128],"presented.":[132]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
