메뉴 건너뛰기




Volumn 7, Issue 5, 2012, Pages 1426-1438

CRêPE: A system for enforcing fine-grained context-related policies on android

Author keywords

Android security; context policy; smartphone security

Indexed keywords

ANDROID SECURITY; CONTEXTUAL INFORMATION; LOW LEVEL; POLICY ENFORCEMENT SYSTEMS; PRODUCTION ENVIRONMENTS; RUNTIMES; THIRD PARTIES;

EID: 84866302360     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2012.2204249     Document Type: Article
Times cited : (65)

References (47)
  • 1
    • 74049155830 scopus 로고    scopus 로고
    • On lightweight mobile phone application certification
    • W. Enck, M. Ongtang, and P.McDaniel, "On lightweight mobile phone application certification," in Proc. CCS '09, 2009, pp. 235-245.
    • (2009) Proc. CCS '09 , pp. 235-245
    • Enck, W.1    Ongtang, M.2    McDaniel, P.3
  • 3
    • 60049085302 scopus 로고    scopus 로고
    • Understanding android security
    • Jan/Feb
    • W. Enck, M. Ongtang, and P. McDaniel, "Understanding android security," IEEE Security Privacy, vol. 7, no. 1, pp. 50-57, Jan./Feb. 2009.
    • (2009) IEEE Security Privacy , vol.7 , Issue.1 , pp. 50-57
    • Enck, W.1    Ongtang, M.2    McDaniel, P.3
  • 5
    • 3142523603 scopus 로고    scopus 로고
    • The UCONABC usage control model
    • Feb
    • J. Park and R. Sandhu, "The UCONABC usage control model," ACM Trans. Inf. Syst. Secur., vol. 7, pp. 128-174, Feb. 2004.
    • (2004) ACM Trans. Inf. Syst. Secur. , vol.7 , pp. 128-174
    • Park, J.1    Sandhu, R.2
  • 7
    • 84870151992 scopus 로고    scopus 로고
    • CRePE: Context-related policy enforcement for Android
    • M. Conti, V. T. N. Nguyen, and B. Crispo, "CRePE: Context-related policy enforcement for Android," in Proc. ISC'10, 2010, pp. 331-345.
    • (2010) Proc. ISC'10 , pp. 331-345
    • Conti, M.1    Nguyen, V.T.N.2    Crispo, B.3
  • 8
    • 51849136554 scopus 로고    scopus 로고
    • Ponder2-A policy environment for autonomous pervasive systems
    • K. Twidle, E. Lupu, N. Dulay, and M. Sloman, "Ponder2-A policy environment for autonomous pervasive systems," in Proc. POLICY '08, 2008, pp. 245-246.
    • (2008) Proc. POLICY '08 , pp. 245-246
    • Twidle, K.1    Lupu, E.2    Dulay, N.3    Sloman, M.4
  • 14
    • 84866295510 scopus 로고    scopus 로고
    • Nokia Forum MIDP-2-0-S igned-MIDlet-Developers-Guide-v2-0-en.pdf [Online]
    • Nokia Forum. Signed MIDlet Developer's Guide. MIDP-2-0-Signed-MIDlet- Developers-Guide-v2-0-en.pdf [Online]. Available: http://www.forum.nokia.com/
    • Signed MIDlet Developer's Guide
  • 15
    • 84866306064 scopus 로고    scopus 로고
    • Symbian Ltd. [Online]
    • Symbian Ltd., Simbian Signed. Internet Webpage [Online]. Available: https://www.symbiansigned.com
    • Simbian Signed. Internet Webpage
  • 16
    • 48649101461 scopus 로고    scopus 로고
    • Extending the java virtual machine to enforce fine-grained security policies in mobile devices
    • I. Ion, B. Dragovic, and B. Crispo, "Extending the java virtual machine to enforce fine-grained security policies in mobile devices," in Proc. ACSAC '07, 2007, pp. 233-242.
    • (2007) Proc. ACSAC '07 , pp. 233-242
    • Ion, I.1    Dragovic, B.2    Crispo, B.3
  • 17
    • 77950851532 scopus 로고    scopus 로고
    • Semantically rich application-centric security in android
    • M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel, "Semantically rich application-centric security in android," in Proc. ACSAC '09, 2009, pp. 73-82.
    • (2009) Proc. ACSAC '09 , pp. 73-82
    • Ongtang, M.1    McLaughlin, S.2    Enck, W.3    McDaniel, P.4
  • 19
    • 77954487766 scopus 로고    scopus 로고
    • Apex: Extending android permission model and enforcement with user-defined runtime constraints
    • M. Nauman, S.Khan, andX. Zhang, "Apex: Extending android permission model and enforcement with user-defined runtime constraints," in Proc. ASIACCS '10, 2010, pp. 328-332.
    • (2010) Proc. ASIACCS '10 , pp. 328-332
    • Nauman, M.1    Khan, S.2    Zhang, X.3
  • 20
    • 84860764042 scopus 로고    scopus 로고
    • MockDroid: Trading privacy for application functionality on smartphones
    • to be published
    • A. R. Beresford, A. Rice, and N. Skehin, "MockDroid: Trading privacy for application functionality on smartphones," in Proc. HotMobile '11, 2011, to be published.
    • (2011) Proc. HotMobile '11
    • Beresford, A.R.1    Rice, A.2    Skehin, N.3
  • 21
    • 84872325256 scopus 로고    scopus 로고
    • Taming Informationstealing smartphone applications (on Android)
    • to be published
    • Y. Zhou, X. Zhang, X. Jiang, and V. Freeh, "Taming Informationstealing smartphone applications (on Android)," in Proc. TRUST 2011, 2011, to be published.
    • (2011) Proc. TRUST 2011
    • Zhou, Y.1    Zhang, X.2    Jiang, X.3    Freeh, V.4
  • 24
    • 33746900477 scopus 로고    scopus 로고
    • Context-sensitive access controlmodel and implementation
    • W. Han, J. Zhang, and X. Yao, "Context-sensitive access controlmodel and implementation," in Proc. CIT '05, 2005, pp. 757-763.
    • (2005) Proc. CIT '05 , pp. 757-763
    • Han, W.1    Zhang, J.2    Yao, X.3
  • 27
    • 24644480838 scopus 로고    scopus 로고
    • Srbac: A spatial role-based access control model for mobile systems
    • F. Hansen and V. Oleshchuk, "Srbac: A spatial role-based access control model for mobile systems," in Proc. NORDSEC'03, 2003, pp. 129-141.
    • (2003) Proc. NORDSEC'03 , pp. 129-141
    • Hansen, F.1    Oleshchuk, V.2
  • 28
    • 77957881432 scopus 로고    scopus 로고
    • A context-constrained authorisation (cocoa) framework for pervasive grid computing
    • Aug.
    • J. Chin, N. Zhang, A. Nenadic, and O. Bamasak, "A context-constrained authorisation (cocoa) framework for pervasive grid computing," Wirel. Netw., vol. 16, pp. 1541-1556, Aug. 2010.
    • (2010) Wirel. Netw. , vol.16 , pp. 1541-1556
    • Chin, J.1    Zhang, N.2    Nenadic, A.3    Bamasak, O.4
  • 30
    • 70349331706 scopus 로고    scopus 로고
    • A context-risk-aware access control model for ubiquitous environments
    • A. Ahmed and N. Zhang, "A context-risk-aware access control model for ubiquitous environments," in Proc. IMCSIT '08, 2008, pp. 775-782.
    • (2008) Proc. IMCSIT '08 , pp. 775-782
    • Ahmed, A.1    Zhang, N.2
  • 33
    • 33749080076 scopus 로고    scopus 로고
    • Attributed Based Access Control (ABAC) for web services
    • DOI 10.1109/ICWS.2005.25, 1530847, Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005
    • E. Yuan and J. Tong, "Attributed based access control (abac) for web services," in Proc. IEEE Int. Conf. Web Services, Washington, D.C. [Online]. Available: http://dx.doi.org/10.1109/ICWS.2005.25, IEEE Computer Society, 2005 pp. 561-569, ser. ICWS '05 (Pubitemid 44460249)
    • (2005) Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005 , vol.2005 , pp. 561-569
    • Yuan, E.1    Tong, J.2
  • 34
    • 20844435938 scopus 로고    scopus 로고
    • A trust-based context-aware access control model for web-services
    • DOI 10.1007/s10619-005-1075-7
    • R. Bhatti, E. Bertino, and A. Ghafoor, "A trust-based context-aware access control model for web-services," Distributed and Parallel Databases, vol. 18, no. 1, pp. 83-105, 2005. (Pubitemid 40859651)
    • (2005) Distributed and Parallel Databases , vol.18 , Issue.1 , pp. 83-105
    • Bhatti, R.1    Bertino, E.2    Ghafoor, A.3
  • 36
    • 0016984825 scopus 로고
    • Protection in operating systems
    • Aug
    • M. A. Harrison, W. L. Ruzzo, and J. D. Ullman, "Protection in operating systems," Commun. ACM, vol. 19, pp. 461-471, Aug. 1976.
    • (1976) Commun. ACM , vol.19 , pp. 461-471
    • Harrison, M.A.1    Ruzzo, W.L.2    Ullman, J.D.3
  • 39
    • 58049198098 scopus 로고    scopus 로고
    • Specifying and enforcing high-level semantic obligation policies
    • Z. Liu, A. Ranganathan, and A. Riabov, "Specifying and enforcing high-level semantic obligation policies," Web Semant., vol. 7, pp. 28-39, 2009.
    • (2009) Web Semant. , vol.7 , pp. 28-39
    • Liu, Z.1    Ranganathan, A.2    Riabov, A.3
  • 40
    • 79956003691 scopus 로고    scopus 로고
    • Mind how you answer me! (transparently authenticating the user of a smartphone when answering or placing a call)
    • M. Conti, I. Zachia-Zlatea, and B. Crispo, "Mind how you answer me! (transparently authenticating the user of a smartphone when answering or placing a call)," in Proc. ASIACCS '11, 2011, pp. 249-259.
    • (2011) Proc. ASIACCS '11 , pp. 249-259
    • Conti, M.1    Zachia-Zlatea, I.2    Crispo, B.3
  • 42
  • 44
    • 84893047581 scopus 로고    scopus 로고
    • Internet Webpage [Online]
    • ARM Trustzone Technology, Internet Webpage [Online]. Available: http://www.arm.com/products/processors/technologies/trustzone.php
    • ARM Trustzone Technology
  • 45
  • 46
    • 78650632079 scopus 로고    scopus 로고
    • Accurate online power estimation and automatic battery behavior based power model generation for smartphones
    • L. Zhang, B. Tiwana, Z. Qian, Z. Wang, R. P. Dick, Z. M. Mao, and L. Yang, "Accurate online power estimation and automatic battery behavior based power model generation for smartphones," in Proc. CODES/ISSS '10, 2010, pp. 105-114.
    • (2010) Proc. CODES/ISSS '10 , pp. 105-114
    • Zhang, L.1    Tiwana, B.2    Qian, Z.3    Wang, Z.4    Dick, R.P.5    Mao, Z.M.6    Yang, L.7
  • 47
    • 85008028661 scopus 로고    scopus 로고
    • Geolocation and assisted gps
    • G. M. Djuknic and R. E. Richton, "Geolocation and assisted gps," Computer, vol. 34, no. 2, pp. 123-125, 2001.
    • (2001) Computer , vol.34 , Issue.2 , pp. 123-125
    • Djuknic, G.M.1    Richton, R.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.