-
1
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to Android
-
D. Barrera, H. G. u. c. Kayacik, P. C. van Oorschot, and A. Somayaji. A methodology for empirical analysis of permission-based security models and its application to Android. In Computer and Communications Security, pages 73-84, 2010.
-
(2010)
Computer and Communications Security
, pp. 73-84
-
-
Barrera, D.1
Kayacik H G, U.C.2
Van Oorschot, P.C.3
Somayaji, A.4
-
2
-
-
77953995033
-
Trained to accept?: A field experiment on consent dialogs
-
R. Böhme and S. Köpsell. Trained to accept?: A field experiment on consent dialogs. In CHI, pages 2403-2406, 2010.
-
(2010)
CHI
, pp. 2403-2406
-
-
Böhme, R.1
Köpsell, S.2
-
3
-
-
40249106199
-
Privacy-invasive software and preventive mechanisms
-
M. Boldt and B. Carlsson. Privacy-invasive software and preventive mechanisms. In PROC of ICSNC, 2006.
-
(2006)
PROC of ICSNC
-
-
Boldt, M.1
Carlsson, B.2
-
4
-
-
79955854747
-
The privacy jungle: On the market for data protection in social networks
-
J. Bonneau and S. Preibusch. The privacy jungle: On the market for data protection in social networks. In WEIS, 2009.
-
(2009)
WEIS
-
-
Bonneau, J.1
Preibusch, S.2
-
5
-
-
84964572278
-
It's all about the benjamins: An empirical study on incentivizing users to ignore security advice
-
N. Christin, S. Egelman, T. Vidas, and J. Grossklags. It's all about the benjamins: An empirical study on incentivizing users to ignore security advice. In Financial Crypto, 2011.
-
(2011)
Financial Crypto
-
-
Christin, N.1
Egelman, S.2
Vidas, T.3
Grossklags, J.4
-
7
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In PROC of the USENIX conference on OSDI, pages 1-6, 2010.
-
(2010)
PROC of the USENIX Conference on OSDI
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
8
-
-
85025700509
-
A study of android application security
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of android application security. In PROC of the USENIX conference on Security, pages 21-21, 2011.
-
(2011)
PROC of the USENIX Conference on Security
, pp. 21-21
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
9
-
-
80755187788
-
Android permissions demystified
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Computer and Communications Security, pages 627-638, 2011.
-
(2011)
Computer and Communications Security
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
11
-
-
79961080173
-
Vision: Automated security validation of mobile apps at app markets
-
P. Gilbert, B.-G. Chun, L. P. Cox, and J. Jung. Vision: automated security validation of mobile apps at app markets. In PROC of MCS, pages 21-26, 2011.
-
(2011)
PROC of MCS
, pp. 21-26
-
-
Gilbert, P.1
Chun, B.-G.2
Cox, L.P.3
Jung, J.4
-
12
-
-
70350714539
-
Challenges in supporting end-user privacy and security management with social navigation
-
J. Goecks, W. K. Edwards, and E. D. Mynatt. Challenges in supporting end-user privacy and security management with social navigation. In PROC of SOUPS, pages 5:1-5:12, 2009.
-
(2009)
PROC of SOUPS
, pp. 51-512
-
-
Goecks, J.1
Edwards, W.K.2
Mynatt, E.D.3
-
13
-
-
33745862646
-
Stopping spyware at the gate: A user study of privacy, notice and spyware
-
N. Good, R. Dhamija, J. Grossklags, D. Thaw, S. Aronowitz, D. Mulligan, and J. Konstan. Stopping spyware at the gate: a user study of privacy, notice and spyware. In PROC of SOUPS, SOUPS '05, 2005.
-
(2005)
PROC of SOUPS, SOUPS '05
-
-
Good, N.1
Dhamija, R.2
Grossklags, J.3
Thaw, D.4
Aronowitz, S.5
Mulligan, D.6
Konstan, J.7
-
14
-
-
35348905154
-
Noticing notice: A large-scale experiment on the timing of software license agreements
-
N. S. Good, J. Grossklags, D. K. Mulligan, and J. A. Konstan. Noticing notice: a large-scale experiment on the timing of software license agreements. In PROC of CHI, CHI '07, pages 607-616, 2007.
-
(2007)
PROC of CHI, CHI '07
, pp. 607-616
-
-
Good, N.S.1
Grossklags, J.2
Mulligan, D.K.3
Konstan, J.A.4
-
15
-
-
38549085605
-
Empirical studies on software notices to inform policy makers and usability designers
-
J. Grossklags and N. Good. Empirical studies on software notices to inform policy makers and usability designers. In PROC of Financial cryptography and Usable Security, pages 341-355, 2007.
-
(2007)
PROC of Financial Cryptography and Usable Security
, pp. 341-355
-
-
Grossklags, J.1
Good, N.2
-
16
-
-
84993048403
-
The platform for privacy preference as a social protocol: An examination within the U.S. Policy context
-
H. Hochheiser. The platform for privacy preference as a social protocol: An examination within the u.s. policy context. ACM Trans. Internet Technol., 2(4):276-306, 2002.
-
(2002)
ACM Trans. Internet Technol.
, vol.2
, Issue.4
, pp. 276-306
-
-
Hochheiser, H.1
-
17
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. In Computer and Communications Security, pages 639-652, 2011.
-
(2011)
Computer and Communications Security
, pp. 639-652
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
18
-
-
4544286640
-
Privacy policies as decision-making tools: An evaluation of online privacy notices
-
C. Jensen and C. Potts. Privacy policies as decision-making tools: an evaluation of online privacy notices. In PROC of CHI, pages 471-478, 2004.
-
(2004)
PROC of CHI
, pp. 471-478
-
-
Jensen, C.1
Potts, C.2
-
19
-
-
84878002243
-
Textured agreements: Re-envisioning electronic consent
-
M. Kay and M. Terry. Textured agreements: re-envisioning electronic consent. In PROC of SOUPS, pages 13:1-13:13, 2010.
-
(2010)
PROC of SOUPS
, pp. 131-1313
-
-
Kay, M.1
Terry, M.2
-
20
-
-
70350731253
-
A "nutrition label" for privacy
-
P. G. Kelley, J. Bresee, L. F. Cranor, and R. W. Reeder. A "nutrition label" for privacy. In PROC of the 5th Symposium on Usable Privacy and Security, SOUPS '09, pages 4:1-4:12, 2009.
-
(2009)
PROC of the 5th Symposium on Usable Privacy and Security, SOUPS '09
, pp. 41-412
-
-
Kelley, P.G.1
Bresee, J.2
Cranor, L.F.3
Reeder, R.W.4
-
21
-
-
77953972803
-
Standardizing privacy notices: An online study of the nutrition label approach
-
P. G. Kelley, L. Cesca, J. Bresee, and L. F. Cranor. Standardizing privacy notices: an online study of the nutrition label approach. In PROC of CHI, pages 1573-1582, 2010.
-
(2010)
PROC of CHI
, pp. 1573-1582
-
-
Kelley, P.G.1
Cesca, L.2
Bresee, J.3
Cranor, L.F.4
-
24
-
-
77954487766
-
Apex: Extending android permission model and enforcement with user-defined runtime constraints
-
M. Nauman, S. Khan, and X. Zhang. Apex: extending android permission model and enforcement with user-defined runtime constraints. In Asia Computer and Communications Security, pages 328-332, 2010.
-
(2010)
Asia Computer and Communications Security
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
25
-
-
84855704068
-
Eyeing your exposure: Quantifying and controlling information sharing for improved privacy
-
R. Schlegel, A. Kapadia, and A. J. Lee. Eyeing your exposure: Quantifying and controlling information sharing for improved privacy. In SOUPS, 2011.
-
(2011)
SOUPS
-
-
Schlegel, R.1
Kapadia, A.2
Lee, A.J.3
-
26
-
-
51349095336
-
A united states perspective on the ethical and legal issues of spyware
-
J. C. Sipior, B. T. Ward, and G. R. Roselli. A united states perspective on the ethical and legal issues of spyware. In PROC of ICEC, ICEC '05, pages 738-743, 2005.
-
(2005)
PROC of ICEC, ICEC '05
, pp. 738-743
-
-
Sipior, J.C.1
Ward, B.T.2
Roselli, G.R.3
-
29
-
-
77954490140
-
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market
-
T. Vila, R. Greenstadt, and D. Molnar. Why we can't be bothered to read privacy policies models of privacy economics as a lemons market. In PROC of ICEC, pages 403-407, 2003.
-
(2003)
PROC of ICEC
, pp. 403-407
-
-
Vila, T.1
Greenstadt, R.2
Molnar, D.3
-
31
-
-
84862971583
-
I regretted the minute i pressed share: A qualitative study of regrets on facebook
-
ACM
-
Y. Wang, G. Norcie, S. Komanduri, A. Acquisti, P. Leon, and L. Cranor. I regretted the minute i pressed share: A qualitative study of regrets on facebook. In Proceedings of the Seventh Symposium on Usable Privacy and Security, page 10. ACM, 2011.
-
(2011)
Proceedings of the Seventh Symposium on Usable Privacy and Security
, pp. 10
-
-
Wang, Y.1
Norcie, G.2
Komanduri, S.3
Acquisti, A.4
Leon, P.5
Cranor, L.6
|