2012
DOI: 10.1007/978-3-642-30244-2_4
|View full text |Cite
|
Sign up to set email alerts
|

Android Security Permissions – Can We Trust Them?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
3
3

Relationship

1
9

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 5 publications
0
9
0
Order By: Relevance
“…However, with the incorporation of BYOD, the threat is about corporate assets being compromised due to employees' devices with vulnerabilities (17), or leaked because they are being accessed from a device connected through an insecure (public) network.…”
Section: Preliminary Concepts and Background About Enterprise Securitymentioning
confidence: 98%
“…However, with the incorporation of BYOD, the threat is about corporate assets being compromised due to employees' devices with vulnerabilities (17), or leaked because they are being accessed from a device connected through an insecure (public) network.…”
Section: Preliminary Concepts and Background About Enterprise Securitymentioning
confidence: 98%
“…However, with the consideration of BYOD, the threat is about corporate assets being compromised due to employees' devices with vulnerabilities [34], or leaked because they are being accessed from a device connected through an unsecured (public) network.…”
Section: Enterprise Securitymentioning
confidence: 98%
“…In order to overcome the limitations, many papers [3][4][5][6][7][8] introduce better permission systems that require a modification of the operation system. However, the approaches cannot run on standard user devices.…”
Section: Application Repackaging In Androidmentioning
confidence: 99%