메뉴 건너뛰기




Volumn , Issue , 2013, Pages 97-111

Securing embedded user interfaces: Android and beyond

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; ANDROID (OPERATING SYSTEM); EMBEDDED SYSTEMS; EMBEDDINGS; MOBILE SECURITY; SMARTPHONES; SOCIAL NETWORKING (ONLINE);

EID: 85076323421     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (70)

References (31)
  • 6
    • 85040311219 scopus 로고    scopus 로고
    • FACEBOOK. Social Plugins. https://developers.facebook.com/docs/plugins/.
    • Social Plugins
  • 10
    • 85076271034 scopus 로고    scopus 로고
    • GOOGLE. AdMob Ads SDK. https://developers.google.com/mobile-ads-sdk/.
    • AdMob Ads SDK
  • 14
    • 84869048738 scopus 로고    scopus 로고
    • MICROSOFT. User Account Control. microsoft.com/en-us/library/windows/desktop/aa511445.aspx.
    • User Account Control
  • 16
    • 80052803379 scopus 로고    scopus 로고
    • Do windows users follow the principle of Least privilege?: Investigating user account control practices
    • MOTIEE, S., HAWKEY, K., and BEZNOSOV, K. Do Windows Users Follow the Principle of Least Privilege?: Investigating User Account Control Practices. In Symposium on Usable Privacy and Security (2010).
    • (2010) Symposium on Usable Privacy and Security
    • Motiee, S.1    Hawkey, K.2    Beznosov, K.3
  • 24
    • 84874888751 scopus 로고    scopus 로고
    • SOPHOS LABS. Facebook Worm: Likejacking, 2010. http://nakedsecurity.sophos.com/2010/05/31/facebook-likejacking-worm/.
    • (2010) Facebook Worm: Likejacking
  • 26
    • 85076317222 scopus 로고    scopus 로고
    • Placeraider: Virtual theft in physical spaces with smartphones
    • TEMPLEMAN, R., RAHMAN, Z., CRANDALL, D. J., and KA-PADIA, A. Placeraider: Virtual theft in physical spaces with smartphones. CoRR abs/1209.5982 (2012).
    • (2012) CoRR
    • Templeman, R.1    Rahman, Z.2    Crandall, D.J.3    Ka-Padia, A.4
  • 27
    • 41149151731 scopus 로고    scopus 로고
    • W3C. Same Origin Policy. http://www.w3.org/Security/wiki/Same_Origin_Policy.
    • Same Origin Policy
  • 30
    • 33751037227 scopus 로고
    • Tech. Rep. MTR 9992, Revision 1 (also published by the Defense Intelligence Agency as DDS-2600-5502-87), The MITRE Corporation, Nov.
    • WOODWARD, J. P. L. Security Requirements for System High and Compartmented Mode Workstations. Tech. Rep. MTR 9992, Revision 1 (also published by the Defense Intelligence Agency as DDS-2600-5502-87), The MITRE Corporation, Nov. 1987.
    • (1987) Security Requirements for System High and Compartmented Mode Workstations
    • Woodward, J.P.L.1
  • 31
    • 12844271558 scopus 로고    scopus 로고
    • Aligning security and usability
    • Sept.
    • YEE, K.-P. Aligning Security and Usability. IEEE Security and Privacy 2(5) (Sept. 2004), 48-55.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 48-55
    • Yee, K.-P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.