메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Context-centric security

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; ANDROID (OPERATING SYSTEM); DATA PRIVACY; FUNCTIONAL PROGRAMMING; MEDICAL APPLICATIONS; SECURITY SYSTEMS;

EID: 84899629080     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (10)

References (19)
  • 4
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. E. Denning. A lattice model of secure information flow. Commun. ACM, 19(5):236-243, May 1976.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D. E.1
  • 5
    • 79955570859 scopus 로고    scopus 로고
    • TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
    • W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010.
    • (2010) OSDI
    • Enck, W.1    Gilbert, P.2    Chun, B.-G.3    Cox, L. P.4    Jung, J.5    McDaniel, P.6    Sheth, A. N.7
  • 7
    • 80755172898 scopus 로고    scopus 로고
    • The effectiveness of application permissions
    • A. P. Felt, K. Greenwood, and D. Wagner. The effectiveness of application permissions. In WebApps, 2011.
    • (2011) WebApps
    • Felt, A. P.1    Greenwood, K.2    Wagner, D.3
  • 8
    • 85091923085 scopus 로고    scopus 로고
    • Repriv: Re-imagining content personalization and in-browser privacy
    • S
    • M. Fredrikson and B. Livshits. Repriv: Re-imagining content personalization and in-browser privacy. In S & P, 2011.
    • (2011)
    • Fredrikson, M.1    Livshits, B.2
  • 10
    • 84943299684 scopus 로고    scopus 로고
    • Privad: Practical privacy in online advertising
    • S. Guha, B. Cheng, and P. Francis. Privad: Practical privacy in online advertising. In NSDI, 2011.
    • (2011) NSDI
    • Guha, S.1    Cheng, B.2    Francis, P.3
  • 11
    • 38149068982 scopus 로고    scopus 로고
    • Implementing a multi-hat pda
    • Springer
    • M. Johnson and F. Stajano. Implementing a multi-hat pda. In Security Protocols, pages 295-307. Springer, 2007.
    • (2007) Security Protocols , pp. 295-307
    • Johnson, M.1    Stajano, F.2
  • 14
    • 73549104415 scopus 로고    scopus 로고
    • Adding Generic Process Containers to the Linux Kernel
    • June
    • P. B. Menage. Adding Generic Process Containers to the Linux Kernel. In Linux Symposium, June 2007.
    • (2007) Linux Symposium
    • Menage, P. B.1
  • 16
    • 84994345605 scopus 로고    scopus 로고
    • User-driven access control: Rethinking permission granting in modern operating systems
    • F. Roesner, T. Kohno, A. Moshchuk, B. Parno, H. Wang, and C. Cowan. User-driven access control: Rethinking permission granting in modern operating systems. In IEEE S&P, 2012.
    • (2012) IEEE S&P
    • Roesner, F.1    Kohno, T.2    Moshchuk, A.3    Parno, B.4    Wang, H.5    Cowan, C.6
  • 17
    • 77953509182 scopus 로고    scopus 로고
    • Treasurephone: Context-sensitive user data protection on mobile phones
    • J. Seifert, A. De Luca, B. Conradi, and H. Hussmann. Treasurephone: Context-sensitive user data protection on mobile phones. Pervasive Computing, pages 130-137, 2010.
    • (2010) Pervasive Computing , pp. 130-137
    • Seifert, J.1    De Luca, A.2    Conradi, B.3    Hussmann, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.