메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Don't kill my ads! Balancing privacy in an ad-supported mobile application market

Author keywords

[No Author keywords available]

Indexed keywords

FEEDBACK CONTROL LOOPS; GENERATED REVENUE; MOBILE APPLICATIONS; PRIVACY PROTECTION; PRIVATE INFORMATION; RESEARCH COMMUNITIES; SOFTWARE DOWNLOADS; THIRD PARTY APPLICATION (APPS); USER PRIVACY; USER PROFILING;

EID: 84860289389     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2162081.2162084     Document Type: Conference Paper
Times cited : (115)

References (16)
  • 1
    • 78649990344 scopus 로고    scopus 로고
    • A methodology for empirical analysis of permission-based security models and its application to android
    • NY, USA ACM
    • D. Barrera, H. G. u. c. Kayacik, P. Oorschot, and A. Somayaji. A methodology for empirical analysis of permission-based security models and its application to android. In CCS '10, NY, USA, 2010. ACM.
    • (2010) CCS '10
    • Barrera, D.1    Kayacik, H.G.U.C.2    Oorschot, P.3    Somayaji, A.4
  • 2
    • 84860764042 scopus 로고    scopus 로고
    • MockDroid: Trading privacy for application functionality on smartphones
    • Mar.
    • A. R. Beresford, A. Rice, N. Skehin, and R. Sohan. MockDroid: trading privacy for application functionality on smartphones. In HotMobile 2011, Mar. 2011.
    • (2011) HotMobile 2011
    • Beresford, A.R.1    Rice, A.2    Skehin, N.3    Sohan, R.4
  • 3
    • 79959868798 scopus 로고    scopus 로고
    • Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
    • Berkeley, CA, USA
    • W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI'10, Berkeley, CA, USA, 2010.
    • (2010) OSDI'10
    • Enck, W.1    Gilbert, P.2    Chun, B.-G.3    Cox, L.P.4    Jung, J.5    McDaniel, P.6    Sheth, A.N.7
  • 5
    • 80755172898 scopus 로고    scopus 로고
    • The effectiveness of application permissions
    • Berkeley, CA, USA
    • A. P. Felt, K. Greenwood, and D. Wagner. The effectiveness of application permissions. In WebApps'11, Berkeley, CA, USA, 2011.
    • (2011) WebApps'11
    • Felt, A.P.1    Greenwood, K.2    Wagner, D.3
  • 6
    • 84943299684 scopus 로고    scopus 로고
    • Privad: Practical privacy in online advertising
    • Mar.
    • S. Guha, B. Cheng, and P. Francis. Privad: Practical Privacy in Online Advertising. In NSDI'11, Mar. 2011.
    • (2011) NSDI'11
    • Guha, S.1    Cheng, B.2    Francis, P.3
  • 7
    • 0014413249 scopus 로고
    • The tragedy of the commons
    • Dec.
    • G. Hardin. The Tragedy of the Commons. Science, 162:1243-1248, Dec. 1968.
    • (1968) Science , vol.162 , pp. 1243-1248
    • Hardin, G.1
  • 8
    • 77956442705 scopus 로고    scopus 로고
    • Sell your experiences: A market mechanism based incentive for participatory sensing
    • IEEE, Mar.
    • J.-S. Lee and B. Hoh. Sell your experiences: a market mechanism based incentive for participatory sensing. In PerCom'10. IEEE, Mar. 2010.
    • (2010) PerCom'10
    • Lee, J.-S.1    Hoh, B.2
  • 9
    • 79958162705 scopus 로고    scopus 로고
    • I'm the mayor of my house: Examining why people use foursquare - A social-driven location sharing application
    • NY, USA
    • J. Lindqvist, J. Cranshaw, J. Wiese, J. Hong, and J. Zimmerman. I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application. In CHI '11, NY, USA, 2011.
    • (2011) CHI '11
    • Lindqvist, J.1    Cranshaw, J.2    Wiese, J.3    Hong, J.4    Zimmerman, J.5
  • 10
    • 84860292720 scopus 로고    scopus 로고
    • Aug '11
    • Lookout. Mobile threat report @ONLINE. https://www.mylookout.com/mobile- threat-report, Aug '11.
    • Mobile Threat Report @ONLINE
  • 12
    • 77954487766 scopus 로고    scopus 로고
    • Apex: Extending android permission model and enforcement with user-defined runtime constraints
    • NY, USA ACM
    • M. Nauman, S. Khan, and X. Zhang. Apex: extending android permission model and enforcement with user-defined runtime constraints. In ASIACCS '10, pages 328-332, NY, USA, 2010. ACM.
    • (2010) ASIACCS '10 , pp. 328-332
    • Nauman, M.1    Khan, S.2    Zhang, X.3
  • 14
    • 80051884253 scopus 로고    scopus 로고
    • Spotme if you can: Randomized responses for location obfuscation on mobile phones
    • Los Alamitos, CA, USA
    • D. Quercia, I. Leontiadis, L. McNamara, C. Mascolo, and J. Crowcroft. Spotme if you can: Randomized responses for location obfuscation on mobile phones. In ICDCS'11, Los Alamitos, CA, USA, 2011.
    • (2011) ICDCS'11
    • Quercia, D.1    Leontiadis, I.2    McNamara, L.3    Mascolo, C.4    Crowcroft, J.5
  • 15
    • 11144338913 scopus 로고
    • Intended and unintended consequences of warning messages: A review and synthesis of empirical research
    • D. W. Stewart and I. M. Martin. Intended and unintended consequences of warning messages: A review and synthesis of empirical research. Journal of Public Policy Marketing, 13(1):1-19, 1994.
    • (1994) Journal of Public Policy Marketing , vol.13 , Issue.1 , pp. 1-19
    • Stewart, D.W.1    Martin, I.M.2
  • 16
    • 80755172896 scopus 로고    scopus 로고
    • Curbing android permission creep
    • Oakland, CA, May
    • T. Vidas, N. Christin, and L. Cranor. Curbing Android permission creep. In W2SP 2011, Oakland, CA, May 2011.
    • (2011) W2SP 2011
    • Vidas, T.1    Christin, N.2    Cranor, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.