-
1
-
-
82955234150
-
The web as an application platform: The saga continues
-
A. Taivalsaari and T. Mikkonen, "The web as an application platform: The saga continues," in Software Engineering and Advanced Applications (SEAA), 2011 37th EUROMICRO Conference on, September 2011, pp. 170 -174.
-
Software Engineering and Advanced Applications (SEAA), 2011 37th EUROMICRO Conference On, September 2011
, pp. 170-174
-
-
Taivalsaari, A.1
Mikkonen, T.2
-
4
-
-
84866755281
-
-
April [Online]. Available:
-
"Bmw connecteddrive," April 2012. [Online]. Available: {http://www.bmw.com/com/en/insights/technology/connecteddrive/ 2010/infotainment/information/internet information.html}
-
(2012)
Bmw Connecteddrive
-
-
-
5
-
-
77956257534
-
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
-
ACM, Online. Available
-
L. Jedrzejczyk, B. A. Price, A. K. Bandara, and B. Nuseibeh, "On the impact of real-time feedback on users' behaviour in mobile location-sharing applications," in Proceedings of SOUPS '10. ACM, 2010, pp. 14:1-14:12. [Online]. Available: http://doi.acm.org/10.1145/1837110.1837129
-
(2010)
Proceedings of SOUPS '10
-
-
Jedrzejczyk, L.1
Price, B.A.2
Bandara, A.K.3
Nuseibeh, B.4
-
6
-
-
84859790175
-
-
December Online. Available
-
The W3C, "Mobile Web Application Best Practices," December 2010. [Online]. Available: http://www.w3.org/TR/2010/REC-mwabp-20101214/
-
(2010)
Mobile Web Application Best Practices
-
-
-
7
-
-
84859465103
-
-
The Wholesale Application Community, August Online. Available
-
The Wholesale Application Community, "Glossary of terms," August 2011. [Online]. Available: http://www.wacapps.net/glossary
-
(2011)
Glossary of Terms
-
-
-
10
-
-
60049085302
-
Understanding Android Security
-
Jan - Feb
-
W. Enck, M. Ongtang, P. McDaniel, W. Enck, M. Ongtang, and P. McDaniel, "Understanding Android Security," Security Privacy, IEEE, vol. 7, no. 1, pp. 50 -57, Jan - Feb 2009.
-
(2009)
Security Privacy, IEEE
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
Enck, W.4
Ongtang, M.5
McDaniel, P.6
-
11
-
-
80755172898
-
The effectiveness of application permissions
-
Proceedings of the 2nd USENIX conference on Web application development, ser. Berkeley, CA, USA: USENIX Association, Online. Available
-
A. P. Felt, K. Greenwood, and D. Wagner, "The effectiveness of application permissions," in Proceedings of the 2nd USENIX conference on Web application development, ser. WebApps'11. Berkeley, CA, USA: USENIX Association, 2011, pp. 7-7. [Online]. Available: http://dl.acm.org/citation.cfm? id=2002168.2002175
-
(2011)
WebApps'11
, pp. 7-7
-
-
Felt, A.P.1
Greenwood, K.2
Wagner, D.3
-
12
-
-
84860764042
-
Mock-droid: Trading privacy for application functionality on smartphones
-
Online. Available
-
A. Beresford, A. Rice, N. Skehin, and R. Sohan, "Mock-droid: trading privacy for application functionality on smartphones," in Proceedings of HotMobile 2011, 2011. [Online]. Available: http: //www.cl.cam.ac.uk/research/ dtg/android/mock/
-
(2011)
Proceedings of HotMobile 2011
-
-
Beresford, A.1
Rice, A.2
Skehin, N.3
Sohan, R.4
-
13
-
-
77954487766
-
Apex: Extending android permission model and enforcement with user-defined runtime constraints
-
Online. Available
-
M. Nauman, S. Khan, and X. Zhang, "Apex: extending android permission model and enforcement with user-defined runtime constraints," in Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, 2010, pp. 328-332. [Online]. Available: http://doi.acm.org/10.1145/1755688.1755732
-
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, 2010
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
14
-
-
84870151992
-
Crepe: Context-related policy enforcement for android
-
Information Security, ser. M. Burmester, G. Tsudik, S. Magliveras, and I. Ilic, Eds. Springer Berlin / Heidelberg, Online. Available
-
M. Conti, V. Nguyen, and B. Crispo, "Crepe: Context-related policy enforcement for android," in Information Security, ser. Lecture Notes in Computer Science, M. Burmester, G. Tsudik, S. Magliveras, and I. Ilic, Eds. Springer Berlin / Heidelberg, 2011, vol. 6531, pp. 331-345. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-18178-8 29
-
(2011)
Lecture Notes in Computer Science
, vol.6531
, pp. 331-345
-
-
Conti, M.1
Nguyen, V.2
Crispo, B.3
-
15
-
-
84866761918
-
-
UCLA Computer Science Department, Tech. Rep. 110017, Online. Available
-
N. Reddy, J. Jeon, J. A. Vaughan, T. Millstein, and J. S. Foster, "Application-centric security policies on unmodified android," UCLA Computer Science Department, Tech. Rep. 110017, 2011. [Online]. Available: http://fmdb.cs.ucla.edu/Treports/acp-tr.pdf
-
(2011)
Application-centric Security Policies on Unmodified Android
-
-
Reddy, N.1
Jeon, J.2
Vaughan, J.A.3
Millstein, T.4
Foster, J.S.5
-
16
-
-
84866761917
-
-
March
-
"SEAndroid Website," http://selinuxproject.org/page/SEAndroid, March 2012.
-
(2012)
SEAndroid Website
-
-
-
17
-
-
84866760168
-
-
January
-
"WAC Specifications 2.1," http://specs.wacapps.net/, January 2012.
-
(2012)
WAC Specifications 2.1
-
-
-
19
-
-
84866760169
-
-
August
-
"Primelife policy language," http://www.primelife.eu/results/ documents/153-534d, August 2010.
-
(2010)
Primelife Policy Language
-
-
-
20
-
-
84866755279
-
Advances in access control policies
-
Springer
-
Claudio A. Ardagna et al., "Advances in access control policies," in Privacy and identity management for life. Springer, 2011, pp. 327-341.
-
(2011)
Privacy and Identity Management for Life
, pp. 327-341
-
-
Ardagna, C.A.1
-
21
-
-
77954893896
-
Data protection models for service provisioning in the cloud
-
ACM, Online. Available
-
D. Lin and A. Squicciarini, "Data protection models for service provisioning in the cloud," in Proceedings of SACMAT. ACM, 2010, pp. 183-192. [Online]. Available: http://doi.acm.org/10.1145/1809842.1809872
-
(2010)
Proceedings of SACMAT
, pp. 183-192
-
-
Lin, D.1
Squicciarini, A.2
-
22
-
-
26944487962
-
Context-aware access control mechanism for ubiquitous applications
-
Advances in Web Intelligence, ser. Springer Berlin / Heidelberg, Online. Available: http://dx.doi.org/10.1007/11495772 37
-
Y.-G. Kim, C.-J. Mon, D. Jeong, J.-O. Lee, C.-Y. Song, and D.-K. Baik, "Context-aware access control mechanism for ubiquitous applications," in Advances in Web Intelligence, ser. Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2005, vol. 3528, pp. 932-935. [Online]. Available: {http://dx.doi.org/10.1007/11495772 37}
-
(2005)
Lecture Notes in Computer Science
, vol.3528
, pp. 932-935
-
-
Kim, Y.-G.1
Mon, C.-J.2
Jeong, D.3
Lee, J.-O.4
Song, C.-Y.5
Baik, D.-K.6
-
23
-
-
18844418489
-
Context-based access control management in ubiquitous environments
-
A. Corradi, R. Montanari, and D. Tibaldi, "Context-based access control management in ubiquitous environments," in Network Computing and Applications, 2004. (NCA 2004). Proceedings. Third IEEE International Symposium on, aug.-1 sept. 2004, pp. 253-260.
-
Network Computing and Applications, 2004. (NCA 2004). Proceedings. Third IEEE International Symposium On, Aug.-1 Sept. 2004
, pp. 253-260
-
-
Corradi, A.1
Montanari, R.2
Tibaldi, D.3
-
24
-
-
77953980425
-
Access control for home data sharing: Attitudes, needs and practices
-
Proceedings of the 28th international conference on Human factors in computing systems, ser. New York, NY, USA: ACM, Online. Available
-
Mazurek et al., "Access control for home data sharing: Attitudes, needs and practices," in Proceedings of the 28th international conference on Human factors in computing systems, ser. CHI '10. New York, NY, USA: ACM, 2010, pp. 645-654. [Online]. Available: http://doi.acm.org/10.1145/1753326. 1753421
-
(2010)
CHI '10
, pp. 645-654
-
-
-
25
-
-
34548725499
-
A survey on context-aware systems
-
June
-
M. Baldauf, S. Dustdar, and F. Rosenberg, "A survey on context-aware systems," International Journal of Ad Hoc and Ubiquitous Computing, vol. 2, no. 4, pp. 263-277, June 2007.
-
(2007)
International Journal of Ad Hoc and Ubiquitous Computing
, vol.2
, Issue.4
, pp. 263-277
-
-
Baldauf, M.1
Dustdar, S.2
Rosenberg, F.3
-
26
-
-
77954608267
-
The multi-principal os construction of the gazelle web browser
-
Proceedings of the 18th conference on USENIX security symposium, ser. Berkeley, CA, USA: USENIX Association, Online. Available
-
H. J. Wang, C. Grier, A. Moshchuk, S. T. King, P. Choudhury, and H. Venter, "The multi-principal os construction of the gazelle web browser," in Proceedings of the 18th conference on USENIX security symposium, ser. SSYM'09. Berkeley, CA, USA: USENIX Association, 2009, pp. 417-432. [Online]. Available: http://dl.acm.org/citation.cfm? id=1855768.1855794
-
(2009)
SSYM'09
, pp. 417-432
-
-
Wang, H.J.1
Grier, C.2
Moshchuk, A.3
King, S.T.4
Choudhury, P.5
Venter, H.6
-
27
-
-
33751067472
-
A safety-oriented platform for web applications
-
Proceedings of the 2006 IEEE Symposium on Security and Privacy, ser. Washington, DC, USA: IEEE Computer Society, Online. Available
-
R. S. Cox, S. D. Gribble, H. M. Levy, and J. G. Hansen, "A safety-oriented platform for web applications," in Proceedings of the 2006 IEEE Symposium on Security and Privacy, ser. SP '06. Washington, DC, USA: IEEE Computer Society, 2006, pp. 350-364. [Online]. Available: http://dx.doi.org/10. 1109/SP.2006.4
-
(2006)
SP '06
, pp. 350-364
-
-
Cox, R.S.1
Gribble, S.D.2
Levy, H.M.3
Hansen, J.G.4
-
28
-
-
77955224128
-
On the incoherencies in web browser access control policies
-
K. Singh, A. Moshchuk, H. J. Wang, and W. Lee, "On the incoherencies in web browser access control policies," in Security and Privacy (SP), 2010 IEEE Symposium on, may 2010, pp. 463-478.
-
Security and Privacy (SP), 2010 IEEE Symposium On, May 2010
, pp. 463-478
-
-
Singh, K.1
Moshchuk, A.2
Wang, H.J.3
Lee, W.4
-
29
-
-
80054916381
-
Enhancing personal information security on android with a new synchronization scheme
-
C. Ai, J. Liu, C. Fan, X. Zhang, and J. Zou, "Enhancing personal information security on android with a new synchronization scheme," in Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on, sept. 2011, pp. 1-4.
-
Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference On, Sept. 2011
, pp. 1-4
-
-
Ai, C.1
Liu, J.2
Fan, C.3
Zhang, X.4
Zou, J.5
-
30
-
-
84873882366
-
-
March Online Available
-
The webinos consortium, "User expectations of privacy and security," March 2011. [Online]. Available: http://webinos.org/blog/2011/ 03/16/d2-3-industry-landscape-ipr-licensing-governance/
-
(2011)
User Expectations of Privacy and Security
-
-
-
31
-
-
84866749012
-
-
March Online. Available
-
-, "Use cases and scenarios," March 2011. [Online]. Available: http: //webinos.org/blog/2011/03/22/webinos-report-use-cases-and-scenarios/
-
(2011)
Use Cases and Scenarios
-
-
-
33
-
-
74049133603
-
An x
-
acml-based privacy-centered access control system, Proceedings of the first ACM workshop on Information security governance, ser. ACM
-
C. A. Ardagna, S. De Capitani di Vimercati, S. Paraboschi, E. Pedrini, and P. Samarati, "An xacml-based privacy-centered access control system," in Proceedings of the first ACM workshop on Information security governance, ser. WISG '09. ACM, 2009, pp. 49-58.
-
(2009)
WISG '09
, pp. 49-58
-
-
Ardagna, C.A.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Pedrini, E.4
Samarati, P.5
-
35
-
-
84866763491
-
-
November Online. Available
-
The webinos consortium, "Phase 1 device, network and server-side api specifications," November 2011. [Online]. Available: http://webinos.org/ blog/2011/11/01/webinos-report-phase-i-device-network-and-server-side-api- specifications/
-
(2011)
Phase 1 Device, Network and Server-side Api Specifications
-
-
|