메뉴 건너뛰기




Volumn , Issue , 2012, Pages 41-50

Flexible data-driven security for Android

Author keywords

Access control; Android; Information flow; Security; Usage control

Indexed keywords

ACCESS RULES; ANDROID; CARDINALITIES; INFORMATION FLOWS; SECURITY; SECURITY AND PERFORMANCE; USAGE CONTROL;

EID: 84866700087     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SERE.2012.14     Document Type: Conference Paper
Times cited : (24)

References (31)
  • 1
    • 84866670655 scopus 로고    scopus 로고
    • Aug.
    • Adobe livecycle rights management es. http://www.adobe.com/products/ livecycle/rightsmanagement/indepth.html, Aug. 2010.
    • (2010)
  • 2
    • 84885884531 scopus 로고    scopus 로고
    • Context-aware usage control for android
    • G. Bai, L. Gu, T. Feng, Y. Guo, and X. Chen. Context-aware usage control for android. In SecureComm, pages 326-343, 2010.
    • (2010) SecureComm , pp. 326-343
    • Bai, G.1    Gu, L.2    Feng, T.3    Guo, Y.4    Chen, X.5
  • 8
  • 10
    • 84866642442 scopus 로고    scopus 로고
    • November
    • Gartner. http://www.gartner.com/it/page.jsp?id=1848514, November 2011.
    • (2011)
  • 11
    • 70350572805 scopus 로고    scopus 로고
    • Flow-sensitive, contextsensitive, and object-sensitive information flow control based on program dependence graphs
    • C. Hammer and G. Snelting. Flow-sensitive, contextsensitive, and object-sensitive information flow control based on program dependence graphs. Int. J. Inf. Sec., 8(6):399-422, 2009.
    • (2009) Int. J. Inf. Sec. , vol.8 , Issue.6 , pp. 399-422
    • Hammer, C.1    Snelting, G.2
  • 12
    • 72849109064 scopus 로고    scopus 로고
    • State-based usage control enforcement with data flow tracking using system call interposition
    • M. Harvan and A. Pretschner. State-based Usage Control Enforcement with Data Flow Tracking using System Call Interposition. In Proc. 3rd Intl. Conf. on Network and System Security, pages 373-380, 2009.
    • (2009) Proc. 3rd Intl. Conf. on Network and System Security , pp. 373-380
    • Harvan, M.1    Pretschner, A.2
  • 15
    • 48649101461 scopus 로고    scopus 로고
    • Extending the Java virtual machine to enforce fine-grained security policies in mobile devices
    • IEEE Computer Society
    • I. Ion, B. Dragovic, and B. Crispo. Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices. In Proc. Annual Computer Security Applications Conference, pages 233-242. IEEE Computer Society, 2007.
    • (2007) Proc. Annual Computer Security Applications Conference , pp. 233-242
    • Ion, I.1    Dragovic, B.2    Crispo, B.3
  • 18
    • 79952778176 scopus 로고    scopus 로고
    • Microsoft. Windows Rights Management Services. http://www.microsoft.com/ windowsserver2008/en/us/ad-rms-overview.aspx, 2010.
    • (2010) Windows Rights Management Services
  • 19
    • 79960969877 scopus 로고    scopus 로고
    • Design and implementation of a fine-grained resource usage model for the android platform
    • M. Nauman and S. Khan. Design and implementation of a fine-grained resource usage model for the android platform. Int. Arab J. Inf. Technol., 8(4):440-448, 2011.
    • (2011) Int. Arab J. Inf. Technol. , vol.8 , Issue.4 , pp. 440-448
    • Nauman, M.1    Khan, S.2
  • 20
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software
    • San Diego, California, USA
    • J. Newsome and D. X. Song. Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2005, San Diego, California, USA, 2005.
    • (2005) Proceedings of the Network and Distributed System Security Symposium, NDSS 2005
    • Newsome, J.1    Song, D.X.2
  • 23
    • 3142523603 scopus 로고    scopus 로고
    • The UCON ABC usage control model
    • J. Park and R. Sandhu. The UCON ABC usage control model. ACM Trans. Inf. Syst. Secur., 7(1):128-174, 2004.
    • (2004) ACM Trans. Inf. Syst. Secur. , vol.7 , Issue.1 , pp. 128-174
    • Park, J.1    Sandhu, R.2
  • 26
    • 33748543201 scopus 로고    scopus 로고
    • Distributed usage control
    • A. Pretschner, M. Hilty, and D. Basin. Distributed usage control. Commun. ACM, 49(9):39-44, 2006.
    • (2006) Commun. ACM , vol.49 , Issue.9 , pp. 39-44
    • Pretschner, A.1    Hilty, M.2    Basin, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.