-
1
-
-
74049155830
-
On lightweight mobile phone application certification
-
W. Enck, M. Ongtang, and P.McDaniel, "On lightweight mobile phone application certification," in Proc. CCS '09, 2009, pp. 235-245.
-
(2009)
Proc. CCS '09
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
3
-
-
60049085302
-
Understanding android security
-
Jan/Feb
-
W. Enck, M. Ongtang, and P. McDaniel, "Understanding android security," IEEE Security Privacy, vol. 7, no. 1, pp. 50-57, Jan./Feb. 2009.
-
(2009)
IEEE Security Privacy
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
4
-
-
84944048132
-
The ponder policy specification language
-
Policies for Distributed Systems and Networks
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman, "The ponder policy specification language," in Proc. POLICY '01, 2001, pp. 18-38. (Pubitemid 33225338)
-
(2001)
Lecture Notes in Computer Science
, Issue.1995
, pp. 18-38
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
5
-
-
3142523603
-
The UCONABC usage control model
-
Feb
-
J. Park and R. Sandhu, "The UCONABC usage control model," ACM Trans. Inf. Syst. Secur., vol. 7, pp. 128-174, Feb. 2004.
-
(2004)
ACM Trans. Inf. Syst. Secur.
, vol.7
, pp. 128-174
-
-
Park, J.1
Sandhu, R.2
-
7
-
-
84870151992
-
CRePE: Context-related policy enforcement for Android
-
M. Conti, V. T. N. Nguyen, and B. Crispo, "CRePE: Context-related policy enforcement for Android," in Proc. ISC'10, 2010, pp. 331-345.
-
(2010)
Proc. ISC'10
, pp. 331-345
-
-
Conti, M.1
Nguyen, V.T.N.2
Crispo, B.3
-
8
-
-
51849136554
-
Ponder2-A policy environment for autonomous pervasive systems
-
K. Twidle, E. Lupu, N. Dulay, and M. Sloman, "Ponder2-A policy environment for autonomous pervasive systems," in Proc. POLICY '08, 2008, pp. 245-246.
-
(2008)
Proc. POLICY '08
, pp. 245-246
-
-
Twidle, K.1
Lupu, E.2
Dulay, N.3
Sloman, M.4
-
14
-
-
84866295510
-
-
Nokia Forum MIDP-2-0-S igned-MIDlet-Developers-Guide-v2-0-en.pdf [Online]
-
Nokia Forum. Signed MIDlet Developer's Guide. MIDP-2-0-Signed-MIDlet- Developers-Guide-v2-0-en.pdf [Online]. Available: http://www.forum.nokia.com/
-
Signed MIDlet Developer's Guide
-
-
-
15
-
-
84866306064
-
-
Symbian Ltd. [Online]
-
Symbian Ltd., Simbian Signed. Internet Webpage [Online]. Available: https://www.symbiansigned.com
-
Simbian Signed. Internet Webpage
-
-
-
16
-
-
48649101461
-
Extending the java virtual machine to enforce fine-grained security policies in mobile devices
-
I. Ion, B. Dragovic, and B. Crispo, "Extending the java virtual machine to enforce fine-grained security policies in mobile devices," in Proc. ACSAC '07, 2007, pp. 233-242.
-
(2007)
Proc. ACSAC '07
, pp. 233-242
-
-
Ion, I.1
Dragovic, B.2
Crispo, B.3
-
17
-
-
77950851532
-
Semantically rich application-centric security in android
-
M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel, "Semantically rich application-centric security in android," in Proc. ACSAC '09, 2009, pp. 73-82.
-
(2009)
Proc. ACSAC '09
, pp. 73-82
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
18
-
-
84885884531
-
Context-aware usage control for android
-
G. Bai, L. Gu, T. Feng, Y. Guo, and X. Chen, "Context-aware usage control for android," in Proc. SecureComm 2010, 2010, pp. 326-343.
-
(2010)
Proc. SecureComm 2010
, pp. 326-343
-
-
Bai, G.1
Gu, L.2
Feng, T.3
Guo, Y.4
Chen, X.5
-
19
-
-
77954487766
-
Apex: Extending android permission model and enforcement with user-defined runtime constraints
-
M. Nauman, S.Khan, andX. Zhang, "Apex: Extending android permission model and enforcement with user-defined runtime constraints," in Proc. ASIACCS '10, 2010, pp. 328-332.
-
(2010)
Proc. ASIACCS '10
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
20
-
-
84860764042
-
MockDroid: Trading privacy for application functionality on smartphones
-
to be published
-
A. R. Beresford, A. Rice, and N. Skehin, "MockDroid: Trading privacy for application functionality on smartphones," in Proc. HotMobile '11, 2011, to be published.
-
(2011)
Proc. HotMobile '11
-
-
Beresford, A.R.1
Rice, A.2
Skehin, N.3
-
21
-
-
84872325256
-
Taming Informationstealing smartphone applications (on Android)
-
to be published
-
Y. Zhou, X. Zhang, X. Jiang, and V. Freeh, "Taming Informationstealing smartphone applications (on Android)," in Proc. TRUST 2011, 2011, to be published.
-
(2011)
Proc. TRUST 2011
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.4
-
22
-
-
84948983013
-
Access control for active spaces
-
G. Sampemane, P. Naldurg, and R. H. Campbell, "Access control for active spaces," in Proc. ACSAC '02, 2002, pp. 343-352.
-
(2002)
Proc. ACSAC '02
, pp. 343-352
-
-
Sampemane, G.1
Naldurg, P.2
Campbell, R.H.3
-
24
-
-
33746900477
-
Context-sensitive access controlmodel and implementation
-
W. Han, J. Zhang, and X. Yao, "Context-sensitive access controlmodel and implementation," in Proc. CIT '05, 2005, pp. 757-763.
-
(2005)
Proc. CIT '05
, pp. 757-763
-
-
Han, W.1
Zhang, J.2
Yao, X.3
-
26
-
-
33847092871
-
GEO-RBAC: A spatially aware RBAC
-
M. L. Damiani, E. Bertino, B. Catania, and P. Perlasca, "GEO-RBAC: A spatially aware RBAC," ACM Trans. Inf. Syst. Secur., vol. 10, no. 1, pp. 1-42, 2007.
-
(2007)
ACM Trans. Inf. Syst. Secur.
, vol.10
, Issue.1
, pp. 1-42
-
-
Damiani, M.L.1
Bertino, E.2
Catania, B.3
Perlasca, P.4
-
27
-
-
24644480838
-
Srbac: A spatial role-based access control model for mobile systems
-
F. Hansen and V. Oleshchuk, "Srbac: A spatial role-based access control model for mobile systems," in Proc. NORDSEC'03, 2003, pp. 129-141.
-
(2003)
Proc. NORDSEC'03
, pp. 129-141
-
-
Hansen, F.1
Oleshchuk, V.2
-
28
-
-
77957881432
-
A context-constrained authorisation (cocoa) framework for pervasive grid computing
-
Aug.
-
J. Chin, N. Zhang, A. Nenadic, and O. Bamasak, "A context-constrained authorisation (cocoa) framework for pervasive grid computing," Wirel. Netw., vol. 16, pp. 1541-1556, Aug. 2010.
-
(2010)
Wirel. Netw.
, vol.16
, pp. 1541-1556
-
-
Chin, J.1
Zhang, N.2
Nenadic, A.3
Bamasak, O.4
-
29
-
-
34547371707
-
Enforcing access control using risk assessment
-
DOI 10.1109/ECUMN.2007.19, 4115226, Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks
-
N. N. Diep, L. X. Hung, Y. Zhung, S. Lee, Y.-K. Lee, and H. Lee, "Enforcing access control using risk assessment," in Proc. ECUMN '07, 2007, pp. 419-424. (Pubitemid 47131312)
-
(2007)
Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks
, pp. 419-424
-
-
Diep, N.N.1
Hung, L.X.2
Zhung, Y.3
Lee, S.4
Lee, Y.-K.5
Lee, H.6
-
30
-
-
70349331706
-
A context-risk-aware access control model for ubiquitous environments
-
A. Ahmed and N. Zhang, "A context-risk-aware access control model for ubiquitous environments," in Proc. IMCSIT '08, 2008, pp. 775-782.
-
(2008)
Proc. IMCSIT '08
, pp. 775-782
-
-
Ahmed, A.1
Zhang, N.2
-
31
-
-
18844418489
-
Context-based access control management in ubiquitous environments
-
Proceedings - Third IEEE International Symposium on Network Computing and Applications, NCA 2004
-
A. Corradi, R. Montanari, and D. Tibaldi, "Context-based access control management in ubiquitous environments," in Proc. NCA '04, 2004, pp. 253-260. (Pubitemid 40681683)
-
(2004)
Proceedings - Third IEEE International Symposium on Network Computing and Applications, NCA 2004
, pp. 253-260
-
-
Corradi, A.1
Montanari, R.2
Tibaldi, D.3
-
33
-
-
33749080076
-
Attributed Based Access Control (ABAC) for web services
-
DOI 10.1109/ICWS.2005.25, 1530847, Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005
-
E. Yuan and J. Tong, "Attributed based access control (abac) for web services," in Proc. IEEE Int. Conf. Web Services, Washington, D.C. [Online]. Available: http://dx.doi.org/10.1109/ICWS.2005.25, IEEE Computer Society, 2005 pp. 561-569, ser. ICWS '05 (Pubitemid 44460249)
-
(2005)
Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005
, vol.2005
, pp. 561-569
-
-
Yuan, E.1
Tong, J.2
-
34
-
-
20844435938
-
A trust-based context-aware access control model for web-services
-
DOI 10.1007/s10619-005-1075-7
-
R. Bhatti, E. Bertino, and A. Ghafoor, "A trust-based context-aware access control model for web-services," Distributed and Parallel Databases, vol. 18, no. 1, pp. 83-105, 2005. (Pubitemid 40859651)
-
(2005)
Distributed and Parallel Databases
, vol.18
, Issue.1
, pp. 83-105
-
-
Bhatti, R.1
Bertino, E.2
Ghafoor, A.3
-
35
-
-
77950675112
-
Google android: A comprehensive security assessment
-
Mar/Apr
-
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, and C. Glezer, "Google android: A comprehensive security assessment," IEEE Security Privacy, vol. 8, no. 2, pp. 35-44, Mar./Apr. 2010.
-
(2010)
IEEE Security Privacy
, vol.8
, Issue.2
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
36
-
-
0016984825
-
Protection in operating systems
-
Aug
-
M. A. Harrison, W. L. Ruzzo, and J. D. Ullman, "Protection in operating systems," Commun. ACM, vol. 19, pp. 461-471, Aug. 1976.
-
(1976)
Commun. ACM
, vol.19
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
38
-
-
38949106870
-
XACML policy integration algorithms
-
Feb
-
P. Mazzoleni, B. Crispo, S. Sivasubramanian, and E. Bertino, "XACML policy integration algorithms," ACM Trans. Inf. Syst. Secur., vol. 11, no. 1, pp. 1-29, Feb. 2008.
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.11
, Issue.1
, pp. 1-29
-
-
Mazzoleni, P.1
Crispo, B.2
Sivasubramanian, S.3
Bertino, E.4
-
39
-
-
58049198098
-
Specifying and enforcing high-level semantic obligation policies
-
Z. Liu, A. Ranganathan, and A. Riabov, "Specifying and enforcing high-level semantic obligation policies," Web Semant., vol. 7, pp. 28-39, 2009.
-
(2009)
Web Semant.
, vol.7
, pp. 28-39
-
-
Liu, Z.1
Ranganathan, A.2
Riabov, A.3
-
40
-
-
79956003691
-
Mind how you answer me! (transparently authenticating the user of a smartphone when answering or placing a call)
-
M. Conti, I. Zachia-Zlatea, and B. Crispo, "Mind how you answer me! (transparently authenticating the user of a smartphone when answering or placing a call)," in Proc. ASIACCS '11, 2011, pp. 249-259.
-
(2011)
Proc. ASIACCS '11
, pp. 249-259
-
-
Conti, M.1
Zachia-Zlatea, I.2
Crispo, B.3
-
41
-
-
84866294394
-
Contextdroid: An expression-based context framework for android
-
B. van Wissen, N. Palmer, R. Kemp, T. Kielmann, and H. Bal, "Contextdroid: An expression-based context framework for android," in Proc. PhoneSense '10, 2010, pp. 1-5.
-
(2010)
Proc. PhoneSense '10
, pp. 1-5
-
-
Van Wissen, B.1
Palmer, N.2
Kemp, R.3
Kielmann, T.4
Bal, H.5
-
42
-
-
77954713596
-
-
Internet Webpage Online
-
Android Open Source Project (AOSP), Internet Webpage [Online]. Available: http://source.android.com/
-
Android Open Source Project (AOSP)
-
-
-
44
-
-
84893047581
-
-
Internet Webpage [Online]
-
ARM Trustzone Technology, Internet Webpage [Online]. Available: http://www.arm.com/products/processors/technologies/trustzone.php
-
ARM Trustzone Technology
-
-
-
45
-
-
84866306063
-
-
February Internet Article [Online]
-
D. Wallach, (2011, February) Things overheard on the Wi-Fi from my Android smartphone. Internet Article [Online]. Available: http://www.freedom-to- tinker.com/blog/dwallach/things-overheard-wifi-my%-android-smartphone
-
(2011)
Things Overheard on the Wi-Fi from My Android Smartphone
-
-
Wallach, D.1
-
46
-
-
78650632079
-
Accurate online power estimation and automatic battery behavior based power model generation for smartphones
-
L. Zhang, B. Tiwana, Z. Qian, Z. Wang, R. P. Dick, Z. M. Mao, and L. Yang, "Accurate online power estimation and automatic battery behavior based power model generation for smartphones," in Proc. CODES/ISSS '10, 2010, pp. 105-114.
-
(2010)
Proc. CODES/ISSS '10
, pp. 105-114
-
-
Zhang, L.1
Tiwana, B.2
Qian, Z.3
Wang, Z.4
Dick, R.P.5
Mao, Z.M.6
Yang, L.7
-
47
-
-
85008028661
-
Geolocation and assisted gps
-
G. M. Djuknic and R. E. Richton, "Geolocation and assisted gps," Computer, vol. 34, no. 2, pp. 123-125, 2001.
-
(2001)
Computer
, vol.34
, Issue.2
, pp. 123-125
-
-
Djuknic, G.M.1
Richton, R.E.2
|