메뉴 건너뛰기




Volumn , Issue , 2012, Pages 37-44

Cross-platform access control for mobile web applications

Author keywords

access control; api; middleware; policy; synchronization; web applications; webinos

Indexed keywords

ACCESS CONTROL POLICIES; API; COMMON PLATFORM; CONSISTENT ACCESS; CROSS-PLATFORM; GEOLOCATIONS; IN-CAR SYSTEMS; JAVASCRIPT; MOBILE WEB; PERSONAL DEVICES; POLICY SYSTEMS; SECURITY AND PRIVACY; WEB APPLICATION; WEB-ENABLED DEVICES; WEBINOS;

EID: 84866751160     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/POLICY.2012.9     Document Type: Conference Paper
Times cited : (21)

References (35)
  • 4
    • 84866755281 scopus 로고    scopus 로고
    • April [Online]. Available:
    • "Bmw connecteddrive," April 2012. [Online]. Available: {http://www.bmw.com/com/en/insights/technology/connecteddrive/ 2010/infotainment/information/internet information.html}
    • (2012) Bmw Connecteddrive
  • 5
    • 77956257534 scopus 로고    scopus 로고
    • On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
    • ACM, Online. Available
    • L. Jedrzejczyk, B. A. Price, A. K. Bandara, and B. Nuseibeh, "On the impact of real-time feedback on users' behaviour in mobile location-sharing applications," in Proceedings of SOUPS '10. ACM, 2010, pp. 14:1-14:12. [Online]. Available: http://doi.acm.org/10.1145/1837110.1837129
    • (2010) Proceedings of SOUPS '10
    • Jedrzejczyk, L.1    Price, B.A.2    Bandara, A.K.3    Nuseibeh, B.4
  • 6
    • 84859790175 scopus 로고    scopus 로고
    • December Online. Available
    • The W3C, "Mobile Web Application Best Practices," December 2010. [Online]. Available: http://www.w3.org/TR/2010/REC-mwabp-20101214/
    • (2010) Mobile Web Application Best Practices
  • 7
    • 84859465103 scopus 로고    scopus 로고
    • The Wholesale Application Community, August Online. Available
    • The Wholesale Application Community, "Glossary of terms," August 2011. [Online]. Available: http://www.wacapps.net/glossary
    • (2011) Glossary of Terms
  • 11
    • 80755172898 scopus 로고    scopus 로고
    • The effectiveness of application permissions
    • Proceedings of the 2nd USENIX conference on Web application development, ser. Berkeley, CA, USA: USENIX Association, Online. Available
    • A. P. Felt, K. Greenwood, and D. Wagner, "The effectiveness of application permissions," in Proceedings of the 2nd USENIX conference on Web application development, ser. WebApps'11. Berkeley, CA, USA: USENIX Association, 2011, pp. 7-7. [Online]. Available: http://dl.acm.org/citation.cfm? id=2002168.2002175
    • (2011) WebApps'11 , pp. 7-7
    • Felt, A.P.1    Greenwood, K.2    Wagner, D.3
  • 12
    • 84860764042 scopus 로고    scopus 로고
    • Mock-droid: Trading privacy for application functionality on smartphones
    • Online. Available
    • A. Beresford, A. Rice, N. Skehin, and R. Sohan, "Mock-droid: trading privacy for application functionality on smartphones," in Proceedings of HotMobile 2011, 2011. [Online]. Available: http: //www.cl.cam.ac.uk/research/ dtg/android/mock/
    • (2011) Proceedings of HotMobile 2011
    • Beresford, A.1    Rice, A.2    Skehin, N.3    Sohan, R.4
  • 14
    • 84870151992 scopus 로고    scopus 로고
    • Crepe: Context-related policy enforcement for android
    • Information Security, ser. M. Burmester, G. Tsudik, S. Magliveras, and I. Ilic, Eds. Springer Berlin / Heidelberg, Online. Available
    • M. Conti, V. Nguyen, and B. Crispo, "Crepe: Context-related policy enforcement for android," in Information Security, ser. Lecture Notes in Computer Science, M. Burmester, G. Tsudik, S. Magliveras, and I. Ilic, Eds. Springer Berlin / Heidelberg, 2011, vol. 6531, pp. 331-345. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-18178-8 29
    • (2011) Lecture Notes in Computer Science , vol.6531 , pp. 331-345
    • Conti, M.1    Nguyen, V.2    Crispo, B.3
  • 16
    • 84866761917 scopus 로고    scopus 로고
    • March
    • "SEAndroid Website," http://selinuxproject.org/page/SEAndroid, March 2012.
    • (2012) SEAndroid Website
  • 17
    • 84866760168 scopus 로고    scopus 로고
    • January
    • "WAC Specifications 2.1," http://specs.wacapps.net/, January 2012.
    • (2012) WAC Specifications 2.1
  • 19
    • 84866760169 scopus 로고    scopus 로고
    • August
    • "Primelife policy language," http://www.primelife.eu/results/ documents/153-534d, August 2010.
    • (2010) Primelife Policy Language
  • 20
    • 84866755279 scopus 로고    scopus 로고
    • Advances in access control policies
    • Springer
    • Claudio A. Ardagna et al., "Advances in access control policies," in Privacy and identity management for life. Springer, 2011, pp. 327-341.
    • (2011) Privacy and Identity Management for Life , pp. 327-341
    • Ardagna, C.A.1
  • 21
    • 77954893896 scopus 로고    scopus 로고
    • Data protection models for service provisioning in the cloud
    • ACM, Online. Available
    • D. Lin and A. Squicciarini, "Data protection models for service provisioning in the cloud," in Proceedings of SACMAT. ACM, 2010, pp. 183-192. [Online]. Available: http://doi.acm.org/10.1145/1809842.1809872
    • (2010) Proceedings of SACMAT , pp. 183-192
    • Lin, D.1    Squicciarini, A.2
  • 22
    • 26944487962 scopus 로고    scopus 로고
    • Context-aware access control mechanism for ubiquitous applications
    • Advances in Web Intelligence, ser. Springer Berlin / Heidelberg, Online. Available: http://dx.doi.org/10.1007/11495772 37
    • Y.-G. Kim, C.-J. Mon, D. Jeong, J.-O. Lee, C.-Y. Song, and D.-K. Baik, "Context-aware access control mechanism for ubiquitous applications," in Advances in Web Intelligence, ser. Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2005, vol. 3528, pp. 932-935. [Online]. Available: {http://dx.doi.org/10.1007/11495772 37}
    • (2005) Lecture Notes in Computer Science , vol.3528 , pp. 932-935
    • Kim, Y.-G.1    Mon, C.-J.2    Jeong, D.3    Lee, J.-O.4    Song, C.-Y.5    Baik, D.-K.6
  • 24
    • 77953980425 scopus 로고    scopus 로고
    • Access control for home data sharing: Attitudes, needs and practices
    • Proceedings of the 28th international conference on Human factors in computing systems, ser. New York, NY, USA: ACM, Online. Available
    • Mazurek et al., "Access control for home data sharing: Attitudes, needs and practices," in Proceedings of the 28th international conference on Human factors in computing systems, ser. CHI '10. New York, NY, USA: ACM, 2010, pp. 645-654. [Online]. Available: http://doi.acm.org/10.1145/1753326. 1753421
    • (2010) CHI '10 , pp. 645-654
  • 26
    • 77954608267 scopus 로고    scopus 로고
    • The multi-principal os construction of the gazelle web browser
    • Proceedings of the 18th conference on USENIX security symposium, ser. Berkeley, CA, USA: USENIX Association, Online. Available
    • H. J. Wang, C. Grier, A. Moshchuk, S. T. King, P. Choudhury, and H. Venter, "The multi-principal os construction of the gazelle web browser," in Proceedings of the 18th conference on USENIX security symposium, ser. SSYM'09. Berkeley, CA, USA: USENIX Association, 2009, pp. 417-432. [Online]. Available: http://dl.acm.org/citation.cfm? id=1855768.1855794
    • (2009) SSYM'09 , pp. 417-432
    • Wang, H.J.1    Grier, C.2    Moshchuk, A.3    King, S.T.4    Choudhury, P.5    Venter, H.6
  • 27
    • 33751067472 scopus 로고    scopus 로고
    • A safety-oriented platform for web applications
    • Proceedings of the 2006 IEEE Symposium on Security and Privacy, ser. Washington, DC, USA: IEEE Computer Society, Online. Available
    • R. S. Cox, S. D. Gribble, H. M. Levy, and J. G. Hansen, "A safety-oriented platform for web applications," in Proceedings of the 2006 IEEE Symposium on Security and Privacy, ser. SP '06. Washington, DC, USA: IEEE Computer Society, 2006, pp. 350-364. [Online]. Available: http://dx.doi.org/10. 1109/SP.2006.4
    • (2006) SP '06 , pp. 350-364
    • Cox, R.S.1    Gribble, S.D.2    Levy, H.M.3    Hansen, J.G.4
  • 30
    • 84873882366 scopus 로고    scopus 로고
    • March Online Available
    • The webinos consortium, "User expectations of privacy and security," March 2011. [Online]. Available: http://webinos.org/blog/2011/ 03/16/d2-3-industry-landscape-ipr-licensing-governance/
    • (2011) User Expectations of Privacy and Security
  • 31
    • 84866749012 scopus 로고    scopus 로고
    • March Online. Available
    • -, "Use cases and scenarios," March 2011. [Online]. Available: http: //webinos.org/blog/2011/03/22/webinos-report-use-cases-and-scenarios/
    • (2011) Use Cases and Scenarios
  • 33
    • 74049133603 scopus 로고    scopus 로고
    • An x
    • acml-based privacy-centered access control system, Proceedings of the first ACM workshop on Information security governance, ser. ACM
    • C. A. Ardagna, S. De Capitani di Vimercati, S. Paraboschi, E. Pedrini, and P. Samarati, "An xacml-based privacy-centered access control system," in Proceedings of the first ACM workshop on Information security governance, ser. WISG '09. ACM, 2009, pp. 49-58.
    • (2009) WISG '09 , pp. 49-58
    • Ardagna, C.A.1    De Capitani Di Vimercati, S.2    Paraboschi, S.3    Pedrini, E.4    Samarati, P.5
  • 35
    • 84866763491 scopus 로고    scopus 로고
    • November Online. Available
    • The webinos consortium, "Phase 1 device, network and server-side api specifications," November 2011. [Online]. Available: http://webinos.org/ blog/2011/11/01/webinos-report-phase-i-device-network-and-server-side-api- specifications/
    • (2011) Phase 1 Device, Network and Server-side Api Specifications


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.