메뉴 건너뛰기




Volumn 7, Issue 1, 2009, Pages 50-57

Understanding android security

Author keywords

Android; Mobile phones; Security; Smartphones

Indexed keywords

ANDROID; APPLICATION DEVELOPMENT; OPEN SOURCE OPERATING SYSTEMS; SECURITY; SECURITY MODELS; SMARTPHONES;

EID: 60049085302     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2009.26     Document Type: Review
Times cited : (445)

References (7)
  • 1
    • 0004200684 scopus 로고    scopus 로고
    • Computer Security Technology Planning Study
    • ESD-TR-73-51, Mitre, Oct. 1972
    • J.P. Anderson, Computer Security Technology Planning Study, tech. report ESD-TR-73-51, Mitre, Oct. 1972.
    • tech. report
    • Anderson, J.P.1
  • 2
    • 0016984825 scopus 로고
    • Protection in Operating Systems
    • M.A. Harrison, W.L. Ruzzo, and J.D. Ullman, "Protection in Operating Systems," Comm. ACM, vol. 19, no. 8, 1976, pp. 461-471.
    • (1976) Comm. ACM , vol.19 , Issue.8 , pp. 461-471
    • Harrison, M.A.1    Ruzzo, W.L.2    Ullman, J.D.3
  • 3
    • 0029211469 scopus 로고
    • Practical Domain and Type Enforcement for UNIX
    • IEEE CS Press
    • L. Badger et al., "Practical Domain and Type Enforcement for UNIX," Proc. IEEE Symp. Security and Privacy, IEEE CS Press, 1995, pp. 66-77.
    • (1995) Proc. IEEE Symp. Security and Privacy , pp. 66-77
    • Badger, L.1
  • 4
    • 0016555241 scopus 로고
    • The Protection of Information in Computer Systems
    • J. Saltzer and M. Schroeder, "The Protection of Information in Computer Systems," Proc. IEEE, vol. 63, no. 9, 1975, pp. 1278-1308.
    • (1975) Proc. IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 6
    • 0041524661 scopus 로고    scopus 로고
    • Delegation Logic: A Logic-Based Approach to Distributed Authorization
    • N. Li, B.N. Grosof, and J. Feigenbaum, "Delegation Logic: A Logic-Based Approach to Distributed Authorization," ACM Trans. Information and System Security, vol. 6, no.1, 2003, pp. 128-171.
    • (2003) ACM Trans. Information and System Security , vol.6 , Issue.1 , pp. 128-171
    • Li, N.1    Grosof, B.N.2    Feigenbaum, J.3
  • 7
    • 60049083121 scopus 로고    scopus 로고
    • tech. reportNAS-TR-0094-2008, Network and Security Research Ctr, Dept. Computer Science and Eng, Pennsylvania State Univ, Nov
    • W. Enck, M. Ongtang, and P. McDaniel, Mitigating Android Software Misuse Before It Happens, tech. reportNAS-TR-0094-2008, Network and Security Research Ctr., Dept. Computer Science and Eng., Pennsylvania State Univ., Nov. 2008.
    • (2008) Mitigating Android Software Misuse Before It Happens
    • Enck, W.1    Ongtang, M.2    McDaniel, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.