메뉴 건너뛰기




Volumn 50 LNICST, Issue , 2010, Pages 326-343

Context-aware usage control for Android

Author keywords

Access control; Android; Context aware; Mobile platform; Security

Indexed keywords

ANDROID; COARSE-GRAINED; CONTEXT INFORMATION; CONTEXT-AWARE; DATA PROTECTION; ITS EVALUATION; MOBILE APPLICATIONS; MOBILE ENVIRONMENTS; MOBILE PLATFORM; OPEN SOURCES; PERSONALIZATIONS; POLICY ENFORCEMENT; PRIVACY PROTECTION; RESOURCE USAGE; SECURITY; SECURITY AND PRIVACY; SECURITY CHALLENGES; SECURITY FRAMEWORKS; SECURITY MEASURE; SECURITY MECHANISM; SMART PHONES; TRADITIONAL COMPUTERS; USAGE CONTROL; USER EXPERIENCE;

EID: 84885884531     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-16161-2_19     Document Type: Conference Paper
Times cited : (67)

References (34)
  • 1
    • 38349032537 scopus 로고    scopus 로고
    • STARBAC: Spatio temporal role based access control
    • Meersman, R., Tari, Z. (eds.) LNCS Springer, Heidelberg
    • Aich, S., Sural, S., Majumdar, A.K.: STARBAC: Spatio temporal role based access control. In: Meersman, R., Tari, Z. (eds.) OTM 2007, Part II. LNCS, vol. 4804, pp. 1567-1582. Springer, Heidelberg (2007)
    • (2007) OTM 2007, Part II , vol.4804 , pp. 1567-1582
    • Aich, S.1    Sural, S.2    Majumdar, A.K.3
  • 3
    • 84871581713 scopus 로고    scopus 로고
    • A contextaware security framework for next generation mobile networks
    • Springer, Heidelberg
    • Bandinelli, M., Paganelli, F., Vannuccini, G., Giuli, D.: A contextaware security framework for next generation mobile networks. In: MobiSec. Springer, Heidelberg (2009)
    • (2009) MobiSec.
    • Bandinelli, M.1    Paganelli, F.2    Vannuccini, G.3    Giuli, D.4
  • 5
    • 0032153903 scopus 로고    scopus 로고
    • An access control model supporting periodicity constraints and temporal reasoning
    • Bertino, E., Bettini, C., Ferrari, E., Samarati, P.: An access control model supporting periodicity constraints and temporal reasoning. ACM Trans. Database Syst. 23(3), 231-285 (1998) (Pubitemid 128449274)
    • (1998) ACM Transactions on Database Systems , vol.23 , Issue.3 , pp. 231-285
    • Bertino, E.1    Bettini, C.2    Ferrari, E.3    Samarati, P.4
  • 6
    • 0033645572 scopus 로고    scopus 로고
    • TRBAC: A temporal role-based access control model
    • July 26-27 ACM Press, New York
    • Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal role-based access control model. In: RBAC 2000, July 26-27, pp. 21-30. ACM Press, New York (2000)
    • (2000) RBAC 2000 , pp. 21-30
    • Bertino, E.1    Bonatti, P.A.2    Ferrari, E.3
  • 8
    • 57349125651 scopus 로고    scopus 로고
    • Behavioral detection of malware on mobile handsets
    • ACM, New York
    • Bose, A., Hu, X., Shin, K.G., Park, T.: Behavioral detection of malware on mobile handsets. In: MobiSys 2008, pp. 225-238. ACM, New York (2008)
    • (2008) MobiSys 2008 , pp. 225-238
    • Bose, A.1    Hu, X.2    Shin, K.G.3    Park, T.4
  • 10
    • 84948995473 scopus 로고    scopus 로고
    • A contextaware security architecture for emerging applications
    • Covington, M.J., Fogla, P., Zhan, Z., Ahamad, M.: A contextaware security architecture for emerging applications. In: ACSAC, pp. 249-260 (2002)
    • (2002) ACSAC , pp. 249-260
    • Covington, M.J.1    Fogla, P.2    Zhan, Z.3    Ahamad, M.4
  • 12
    • 10944254818 scopus 로고    scopus 로고
    • Mobile phones as computing devices: The viruses are coming!
    • DOI 10.1109/MPRV.2004.21
    • Dagon, D., Martin, T., Starner, T.: Mobile phones as computing devices: the viruses are coming! IEEE Pervasive Computing 3(4), 11-15 (2004) (Pubitemid 40010893)
    • (2004) IEEE Pervasive Computing , vol.3 , Issue.4 , pp. 11-15
    • Dagon, D.1    Martin, T.2    Starner, T.3
  • 14
    • 74049155830 scopus 로고    scopus 로고
    • On lightweight mobile phone application certification
    • ACM, New York
    • Enck, W., Ongtang, M., McDaniel, P.D.: On lightweight mobile phone application certification. In: Proceedings of CCS 2009, pp. 235-245. ACM, New York (2009)
    • (2009) Proceedings of CCS 2009 , pp. 235-245
    • Enck, W.1    Ongtang, M.2    McDaniel, P.D.3
  • 15
    • 84885887629 scopus 로고    scopus 로고
    • F-Secure. Cabir, http://www.f-secure.com/v-descs/cabir.shtml
    • Cabir
  • 16
    • 84869681377 scopus 로고    scopus 로고
    • F-Secure. Pbstealer. A., http://www.f-secure.com/v-descs/pbstealer-a. shtml
    • Pbstealer. A.
  • 18
    • 84885886869 scopus 로고    scopus 로고
    • Google. Android, http://www.android.com
  • 19
    • 74049105975 scopus 로고    scopus 로고
    • Mobile malware
    • August (Invited Talk)
    • Hypponen, M.: Mobile Malware. In: USENIX Security Symposium (August 2007), http://www.usenix.org/events/sec07/tech/hypponen.pdf (Invited Talk)
    • (2007) USENIX Security Symposium
    • Hypponen, M.1
  • 21
    • 51949119464 scopus 로고    scopus 로고
    • Master's thesis, Department of Computer Science, University of California Santa Barbara June
    • Mulliner, C.: Security of Smart Phones. Master's thesis, Department of Computer Science, University of California Santa Barbara (June 2006)
    • (2006) Security of Smart Phones
    • Mulliner, C.1
  • 22
    • 77954487766 scopus 로고    scopus 로고
    • Apex: Extending android permission model and enforcement with user-defined runtime constraints
    • Beijing, China, April 13-16. ACM, New York
    • Nauman, M., Khan, S., Alam, M., Zhang, X.: Apex: Extending android permission model and enforcement with user-defined runtime constraints. In: ASIACCS 2010, Beijing, China, April 13-16. ACM, New York (2010)
    • (2010) ASIACCS 2010
    • Nauman, M.1    Khan, S.2    Alam, M.3    Zhang, X.4
  • 24
    • 0242456750 scopus 로고    scopus 로고
    • Towards usage control models: Beyond traditional access control
    • Park, J., Sandhu, R.S.: Towards usage control models: beyond traditional access control. In: SACMAT, pp. 57-64 (2002)
    • (2002) SACMAT , pp. 57-64
    • Park, J.1    Sandhu, R.S.2
  • 25
    • 85015437589 scopus 로고    scopus 로고
    • LRBAC: A location-aware role-based access control model
    • Bagchi, A., Atluri, V. (eds.) LNCS Springer, Heidelberg
    • Ray, I., Kumar, M., Yu, L.: LRBAC: A location-aware role-based access control model. In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol. 4332, pp. 147-161. Springer, Heidelberg (2006)
    • (2006) ICISS 2006 , vol.4332 , pp. 147-161
    • Ray, I.1    Kumar, M.2    Yu, L.3
  • 26
    • 84885883908 scopus 로고    scopus 로고
    • Android reference. Develope Guide, http://developer.android.com/guide/ index.html
    • Develope Guide
  • 27
    • 33744989032 scopus 로고    scopus 로고
    • Usage control: A vision for next generation access control
    • Sandhu, R.S., Park, J.: Usage control: A vision for next generation access control. In: MMMACNS (2003)
    • (2003) MMMACNS
    • Sandhu, R.S.1    Park, J.2
  • 28
    • 19344364618 scopus 로고    scopus 로고
    • Role-based access control
    • Sandhu, R.S.: Role-based access control. Advances in Computers 46, 238-287 (1998) (Pubitemid 128153726)
    • (1998) Advances in Computers , vol.46 , pp. 238-287
    • Sandhu, R.S.1
  • 31
    • 84885893949 scopus 로고
    • An efficient symbolic representation of periodic time
    • Finin, T.W., Yesha, Y., Nicholas, C. (eds.) LNCS Springer, Heidelberg
    • Stevenne, J., Niezette, M.: An efficient symbolic representation of periodic time. In: Finin, T.W., Yesha, Y., Nicholas, C. (eds.) CIKM 1992. LNCS, vol. 752. Springer, Heidelberg (1993)
    • (1993) CIKM 1992 , vol.752
    • Stevenne, J.1    Niezette, M.2
  • 32
    • 74949101283 scopus 로고    scopus 로고
    • Designing system-level defenses against ellphone malware
    • September
    • Xie, L., Zhang, X., Chaugule, A., Jaeger, T., Zhu, S.: Designing system-level defenses against ellphone malware. In: SRDS 2009, pp. 83-90 (September 2009)
    • (2009) SRDS 2009 , pp. 83-90
    • Xie, L.1    Zhang, X.2    Chaugule, A.3    Jaeger, T.4    Zhu, S.5
  • 33
    • 79959568144 scopus 로고    scopus 로고
    • A trusted mobile phone reference architecture via secure kernel
    • ACM, New York
    • Zhang, X., Aciiçmez, O., Seifert, J.-P.: A trusted mobile phone reference architecture via secure kernel. In: STC, pp. 7-14. ACM, New York (2007)
    • (2007) STC , pp. 7-14
    • Zhang, X.1    Aciiçmez, O.2    Seifert, J.-P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.