2017
DOI: 10.1186/s13635-017-0065-4
|View full text |Cite
|
Sign up to set email alerts
|

A new approach for managing Android permissions: learning users’ preferences

Abstract: Today, permissions management solutions on mobile devices employ Identity Based Access Control (IBAC) models. If this approach was suitable when people had only a few games (like Snake or Tetris) installed on their mobile phones, the current situation is different. A survey from Google in 2013 showed that, on average, french users have installed 32 applications on their Android smartphones. As a result, these users must manage hundreds of permissions to protect their privacy. Scalability of IBAC is a well-know… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 25 publications
0
4
0
1
Order By: Relevance
“…Oglaza et al present in [42] Kapuer, an IBAC (Identity Based Access Control) related permission management system for Android devices that: i) learns users' privacy preferences with a novel learning algorithm, ii) proposes abstract authorization rules, and iii) provides advanced features to manage these high-level rules.…”
Section: A Access Controlmentioning
confidence: 99%
“…Oglaza et al present in [42] Kapuer, an IBAC (Identity Based Access Control) related permission management system for Android devices that: i) learns users' privacy preferences with a novel learning algorithm, ii) proposes abstract authorization rules, and iii) provides advanced features to manage these high-level rules.…”
Section: A Access Controlmentioning
confidence: 99%
“…Oglaza et al [55] propose Kapuer, a system that uses machine learning to understand user preferences and create rules that permit or deny a permission configuration request. Kapuer can also create high-level permission configuration rules such as "Applications from Social category can have local access to user data" which is a global rule for all the applications from the social category.…”
Section: Approaches That Recommend Permissions Configurationmentioning
confidence: 99%
“…Di sini perlu memahami arsitektur OS Android untuk menilai tingkat kekritisannya yang sebenarnya. Dari informasi izin ini akan dapat terlihat seberapa banyak izin yang diminta aplikasi dan seberapa banyak yang dalam kategori dangerous permissions (Oglaza, 2017). Contoh hasil analisis yang ditampilkan oleh MobSF seperti pada Gambar 3.…”
Section: Gambar 3 Halaman Hasil Analisis Pada Mobsfunclassified