-
1
-
-
38349032537
-
STARBAC: Spatio temporal role based access control
-
Meersman, R., Tari, Z. (eds.) LNCS Springer, Heidelberg
-
Aich, S., Sural, S., Majumdar, A.K.: STARBAC: Spatio temporal role based access control. In: Meersman, R., Tari, Z. (eds.) OTM 2007, Part II. LNCS, vol. 4804, pp. 1567-1582. Springer, Heidelberg (2007)
-
(2007)
OTM 2007, Part II
, vol.4804
, pp. 1567-1582
-
-
Aich, S.1
Sural, S.2
Majumdar, A.K.3
-
2
-
-
33847011964
-
Cerberus: A context-aware security scheme for smart spaces
-
Al-Muhtadi, J., Ranganathan, A., Campbell, R.H., Mickunas, M.D.: Cerberus: A context-aware security scheme for smart spaces. In: PerCom, p. 489 (2003)
-
(2003)
PerCom
, pp. 489
-
-
Al-Muhtadi, J.1
Ranganathan, A.2
Campbell, R.H.3
Mickunas, M.D.4
-
3
-
-
84871581713
-
A contextaware security framework for next generation mobile networks
-
Springer, Heidelberg
-
Bandinelli, M., Paganelli, F., Vannuccini, G., Giuli, D.: A contextaware security framework for next generation mobile networks. In: MobiSec. Springer, Heidelberg (2009)
-
(2009)
MobiSec.
-
-
Bandinelli, M.1
Paganelli, F.2
Vannuccini, G.3
Giuli, D.4
-
5
-
-
0032153903
-
An access control model supporting periodicity constraints and temporal reasoning
-
Bertino, E., Bettini, C., Ferrari, E., Samarati, P.: An access control model supporting periodicity constraints and temporal reasoning. ACM Trans. Database Syst. 23(3), 231-285 (1998) (Pubitemid 128449274)
-
(1998)
ACM Transactions on Database Systems
, vol.23
, Issue.3
, pp. 231-285
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
6
-
-
0033645572
-
TRBAC: A temporal role-based access control model
-
July 26-27 ACM Press, New York
-
Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal role-based access control model. In: RBAC 2000, July 26-27, pp. 21-30. ACM Press, New York (2000)
-
(2000)
RBAC 2000
, pp. 21-30
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
8
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
ACM, New York
-
Bose, A., Hu, X., Shin, K.G., Park, T.: Behavioral detection of malware on mobile handsets. In: MobiSys 2008, pp. 225-238. ACM, New York (2008)
-
(2008)
MobiSys 2008
, pp. 225-238
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
9
-
-
35448979944
-
SmartSiren: Virus detection and alert for smartphones
-
DOI 10.1145/1247660.1247690, MobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services
-
Cheng, J., Wong, S.H.Y., Yang, H., Lu, S.: Smartsiren: virus detection and alert for smart-phones. In: MobiSys 2007, pp. 258-271. ACM, New York (2007) (Pubitemid 47620930)
-
(2007)
MobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services
, pp. 258-271
-
-
Cheng, J.1
Wong, S.H.Y.2
Yang, H.3
Lu, S.4
-
10
-
-
84948995473
-
A contextaware security architecture for emerging applications
-
Covington, M.J., Fogla, P., Zhan, Z., Ahamad, M.: A contextaware security architecture for emerging applications. In: ACSAC, pp. 249-260 (2002)
-
(2002)
ACSAC
, pp. 249-260
-
-
Covington, M.J.1
Fogla, P.2
Zhan, Z.3
Ahamad, M.4
-
12
-
-
10944254818
-
Mobile phones as computing devices: The viruses are coming!
-
DOI 10.1109/MPRV.2004.21
-
Dagon, D., Martin, T., Starner, T.: Mobile phones as computing devices: the viruses are coming! IEEE Pervasive Computing 3(4), 11-15 (2004) (Pubitemid 40010893)
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 11-15
-
-
Dagon, D.1
Martin, T.2
Starner, T.3
-
13
-
-
33847092871
-
Geo-rbac: A spatially aware RBAC
-
Damiani, M.L., Bertino, E., Catania, B., Perlasca, P.: Geo-rbac: A spatially aware RBAC. ACM Trans. Inf. Syst. Secur. 10(1), 2 (2007)
-
(2007)
ACM Trans. Inf. Syst. Secur.
, vol.10
, Issue.1
, pp. 2
-
-
Damiani, M.L.1
Bertino, E.2
Catania, B.3
Perlasca, P.4
-
14
-
-
74049155830
-
On lightweight mobile phone application certification
-
ACM, New York
-
Enck, W., Ongtang, M., McDaniel, P.D.: On lightweight mobile phone application certification. In: Proceedings of CCS 2009, pp. 235-245. ACM, New York (2009)
-
(2009)
Proceedings of CCS 2009
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.D.3
-
15
-
-
84885887629
-
-
F-Secure. Cabir, http://www.f-secure.com/v-descs/cabir.shtml
-
Cabir
-
-
-
16
-
-
84869681377
-
-
F-Secure. Pbstealer. A., http://www.f-secure.com/v-descs/pbstealer-a. shtml
-
Pbstealer. A.
-
-
-
18
-
-
84885886869
-
-
Google. Android, http://www.android.com
-
-
-
-
19
-
-
74049105975
-
Mobile malware
-
August (Invited Talk)
-
Hypponen, M.: Mobile Malware. In: USENIX Security Symposium (August 2007), http://www.usenix.org/events/sec07/tech/hypponen.pdf (Invited Talk)
-
(2007)
USENIX Security Symposium
-
-
Hypponen, M.1
-
21
-
-
51949119464
-
-
Master's thesis, Department of Computer Science, University of California Santa Barbara June
-
Mulliner, C.: Security of Smart Phones. Master's thesis, Department of Computer Science, University of California Santa Barbara (June 2006)
-
(2006)
Security of Smart Phones
-
-
Mulliner, C.1
-
22
-
-
77954487766
-
Apex: Extending android permission model and enforcement with user-defined runtime constraints
-
Beijing, China, April 13-16. ACM, New York
-
Nauman, M., Khan, S., Alam, M., Zhang, X.: Apex: Extending android permission model and enforcement with user-defined runtime constraints. In: ASIACCS 2010, Beijing, China, April 13-16. ACM, New York (2010)
-
(2010)
ASIACCS 2010
-
-
Nauman, M.1
Khan, S.2
Alam, M.3
Zhang, X.4
-
24
-
-
0242456750
-
Towards usage control models: Beyond traditional access control
-
Park, J., Sandhu, R.S.: Towards usage control models: beyond traditional access control. In: SACMAT, pp. 57-64 (2002)
-
(2002)
SACMAT
, pp. 57-64
-
-
Park, J.1
Sandhu, R.S.2
-
25
-
-
85015437589
-
LRBAC: A location-aware role-based access control model
-
Bagchi, A., Atluri, V. (eds.) LNCS Springer, Heidelberg
-
Ray, I., Kumar, M., Yu, L.: LRBAC: A location-aware role-based access control model. In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol. 4332, pp. 147-161. Springer, Heidelberg (2006)
-
(2006)
ICISS 2006
, vol.4332
, pp. 147-161
-
-
Ray, I.1
Kumar, M.2
Yu, L.3
-
26
-
-
84885883908
-
-
Android reference. Develope Guide, http://developer.android.com/guide/ index.html
-
Develope Guide
-
-
-
27
-
-
33744989032
-
Usage control: A vision for next generation access control
-
Sandhu, R.S., Park, J.: Usage control: A vision for next generation access control. In: MMMACNS (2003)
-
(2003)
MMMACNS
-
-
Sandhu, R.S.1
Park, J.2
-
28
-
-
19344364618
-
Role-based access control
-
Sandhu, R.S.: Role-based access control. Advances in Computers 46, 238-287 (1998) (Pubitemid 128153726)
-
(1998)
Advances in Computers
, vol.46
, pp. 238-287
-
-
Sandhu, R.S.1
-
29
-
-
84885887376
-
Monitoring smartphones for anomaly detection
-
ICST
-
Schmidt, A.-D., Peters, F., Lamour, F., Albayrak, S.: Monitoring smartphones for anomaly detection. In: MOBILWARE 2008. ICST (2007)
-
(2007)
MOBILWARE 2008
-
-
Schmidt, A.-D.1
Peters, F.2
Lamour, F.3
Albayrak, S.4
-
30
-
-
77950675112
-
Google android: A comprehensive security assessment
-
Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google android: A comprehensive security assessment. IEEE Security & Privacy (2010)
-
(2010)
IEEE Security & Privacy
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
31
-
-
84885893949
-
An efficient symbolic representation of periodic time
-
Finin, T.W., Yesha, Y., Nicholas, C. (eds.) LNCS Springer, Heidelberg
-
Stevenne, J., Niezette, M.: An efficient symbolic representation of periodic time. In: Finin, T.W., Yesha, Y., Nicholas, C. (eds.) CIKM 1992. LNCS, vol. 752. Springer, Heidelberg (1993)
-
(1993)
CIKM 1992
, vol.752
-
-
Stevenne, J.1
Niezette, M.2
-
32
-
-
74949101283
-
Designing system-level defenses against ellphone malware
-
September
-
Xie, L., Zhang, X., Chaugule, A., Jaeger, T., Zhu, S.: Designing system-level defenses against ellphone malware. In: SRDS 2009, pp. 83-90 (September 2009)
-
(2009)
SRDS 2009
, pp. 83-90
-
-
Xie, L.1
Zhang, X.2
Chaugule, A.3
Jaeger, T.4
Zhu, S.5
-
33
-
-
79959568144
-
A trusted mobile phone reference architecture via secure kernel
-
ACM, New York
-
Zhang, X., Aciiçmez, O., Seifert, J.-P.: A trusted mobile phone reference architecture via secure kernel. In: STC, pp. 7-14. ACM, New York (2007)
-
(2007)
STC
, pp. 7-14
-
-
Zhang, X.1
Aciiçmez, O.2
Seifert, J.-P.3
-
34
-
-
33745450500
-
Formal model and policy specification of usage control
-
DOI 10.1145/1108906.1108908
-
Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal model and policy specification of usage control. TISSEC 8(4), 351-387 (2005) (Pubitemid 43951886)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.4
, pp. 351-387
-
-
Zhang, X.1
Parisi-Presicce, F.2
Sandhu, R.3
Park, J.4
|