-
1
-
-
84971391590
-
-
FTC report on Credit Karma and Fandango. https://www.ftc.gov/news-events/pressreleases/2014/03/fandango-credit-karmasettle-ftc-charges-they-deceivedconsumers, 2014
-
(2014)
FTC Report on Credit Karma and Fandango
-
-
-
2
-
-
84971396319
-
-
FTC report on Snapchat. https://www.ftc.gov/news-events/pressreleases/2014/06/ftc-testifiesgeolocation-privacy, 2014
-
(2014)
FTC Report on Snapchat
-
-
-
4
-
-
84971432929
-
-
Permissions. https://developer.android.com/preview/features/runtime-permissions.html, 2015
-
(2015)
Permissions
-
-
-
6
-
-
84901614388
-
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps
-
S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. Le Traon, D. Octeau, and P. McDaniel. Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, pages 259-269, 2014
-
(2014)
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 259-269
-
-
Arzt, S.1
Rasthofer, S.2
Fritz, C.3
Bodden, E.4
Bartel, A.5
Klein, J.6
Le Traon, Y.7
Octeau, D.8
McDaniel, P.9
-
7
-
-
84869388345
-
Pscout: Analyzing the android permission specification
-
ACM
-
K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie. Pscout: Analyzing the android permission specification. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 217-228. ACM, 2012
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 217-228
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Lie, D.4
-
10
-
-
10744225535
-
Representation and reasoning for daml-based policy and domain services in kaos and nomads
-
ACM
-
J. Bradshaw, A. Uszok, R. Jeffers, N. Suri, P. Hayes, M. Burstein, A. Acquisti, B. Benyo, M. Breedy, M. Carvalho, et al. Representation and reasoning for daml-based policy and domain services in kaos and nomads. In Proceedings of the second international joint conference on Autonomous agents and multiagent systems, pages 835-842. ACM, 2003
-
(2003)
Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems
, pp. 835-842
-
-
Bradshaw, J.1
Uszok, A.2
Jeffers, R.3
Suri, N.4
Hayes, P.5
Burstein, M.6
Acquisti, A.7
Benyo, B.8
Breedy, M.9
Carvalho, M.10
-
12
-
-
84906230637
-
Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements
-
T. D. Breaux, H. Hibshi, and A. Rao. Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements. Requirements Engineering, 19(3):281-307, 2014
-
(2014)
Requirements Engineering
, vol.19
, Issue.3
, pp. 281-307
-
-
Breaux, T.D.1
Hibshi, H.2
Rao, A.3
-
13
-
-
13244268385
-
Soupa: Standard ontology for ubiquitous and pervasive applications
-
IEEE
-
H. Chen, F. Perich, T. Finin, and A. Joshi. Soupa: Standard ontology for ubiquitous and pervasive applications. In Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004. The First Annual International Conference on, pages 258-267. IEEE, 2004
-
(2004)
Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004. the First Annual International Conference on
, pp. 258-267
-
-
Chen, H.1
Perich, F.2
Finin, T.3
Joshi, A.4
-
15
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10, pages 1-6, 2010
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
16
-
-
80755187788
-
Android permissions demystified
-
ACM
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and communications security, pages 627-638. ACM, 2011
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
17
-
-
84877978222
-
Scandroid: Automated security certification of android applications
-
Univ. of Maryland
-
A. P. Fuchs, A. Chaudhuri, and J. S. Foster. Scandroid: Automated security certification of android applications. Manuscript, Univ. of Maryland, http://www.cs. umd.edu/avik/projects/scandroidascaa, 2(3), 2009
-
(2009)
Manuscript
, vol.2
, Issue.3
-
-
Fuchs, A.P.1
Chaudhuri, A.2
Foster, J.S.3
-
22
-
-
4344716019
-
Authorization and privacy for semantic web services
-
L. Kagal, T. Finin, M. Paolucci, N. Srinivasan, K. Sycara, and G. Denker. Authorization and privacy for semantic web services. Intelligent Systems, IEEE, 19(4):50-56, 2004
-
(2004)
Intelligent Systems, IEEE
, vol.19
, Issue.4
, pp. 50-56
-
-
Kagal, L.1
Finin, T.2
Paolucci, M.3
Srinivasan, N.4
Sycara, K.5
Denker, G.6
-
24
-
-
84869416020
-
Chex: Statically vetting android apps for component hijacking vulnerabilities
-
L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang. Chex: Statically vetting android apps for component hijacking vulnerabilities. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, pages 229-240, 2012
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 229-240
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
28
-
-
84971396428
-
Analyzing privacy of android apps
-
PhD thesis
-
G. Petronella. Analyzing Privacy of Android Apps. PhD thesis, Politecnico di Milano, 2014
-
(2014)
Politecnico di Milano
-
-
Petronella, G.1
-
31
-
-
84950294621
-
-
J. R. Reidenberg, T. Breaux, L. F. Cranor, B. French, A. Grannis, J. T. Graves, F. Liu, A. M. McDonald, T. B. Norton, R. Ramanath, et al. Disagreeable privacy policies: Mismatches between meaning and usersŠ understanding. 2014
-
(2014)
Disagreeable Privacy Policies: Mismatches between Meaning and UsersŠ Understanding
-
-
Reidenberg, J.R.1
Breaux, T.2
Cranor, L.F.3
French, B.4
Grannis, A.5
Graves, J.T.6
Liu, F.7
McDonald, A.M.8
Norton, T.B.9
Ramanath, R.10
-
35
-
-
51849130014
-
New developments in ontology-based policy management: Increasing the practicality and comprehensiveness of kaos
-
IEEE
-
A. Uszok, J. M. Bradshaw, J. Lott, M. Breedy, L. Bunch, P. Feltovich, M. Johnson, and H. Jung. New developments in ontology-based policy management: Increasing the practicality and comprehensiveness of kaos. In Policies for Distributed Systems and Networks, 2008. POLICY 2008. IEEE Workshop on, pages 145-152. IEEE, 2008
-
(2008)
Policies for Distributed Systems and Networks, 2008. POLICY 2008. IEEE Workshop on
, pp. 145-152
-
-
Uszok, A.1
Bradshaw, J.M.2
Lott, J.3
Breedy, M.4
Bunch, L.5
Feltovich, P.6
Johnson, M.7
Jung, H.8
-
37
-
-
84971449209
-
Towards an information ontology for personal privacy
-
S. Wadkar and T. Breaux. Towards an information ontology for personal privacy. Technical report
-
Technical Report
-
-
Wadkar, S.1
Breaux, T.2
-
41
-
-
84889068951
-
Vetting undesirable behaviors in android apps with permission use analysis
-
ACM
-
Y. Zhang, M. Yang, B. Xu, Z. Yang, G. Gu, P. Ning, X. S. Wang, and B. Zang. Vetting undesirable behaviors in android apps with permission use analysis. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pages 611-622. ACM, 2013
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security
, pp. 611-622
-
-
Zhang, Y.1
Yang, M.2
Xu, B.3
Yang, Z.4
Gu, G.5
Ning, P.6
Wang, X.S.7
Zang, B.8
|