Proceedings of the 3rd International Workshop on Mobile Development Lifecycle 2015
DOI: 10.1145/2846661.2846664
|View full text |Cite
|
Sign up to set email alerts
|

Enforcing fine-grained security and privacy policies in an ecosystem within an ecosystem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…[32] [11], [27], [30] Harm to inhabitants Causing physical or mental harm to individuals including vulnerable groups (e.g. children and older adults) that may be susceptible to nefarious influence.…”
Section: Energy Theftmentioning
confidence: 99%
“…[32] [11], [27], [30] Harm to inhabitants Causing physical or mental harm to individuals including vulnerable groups (e.g. children and older adults) that may be susceptible to nefarious influence.…”
Section: Energy Theftmentioning
confidence: 99%
“…Neisse et al [150] Name is not defined A static and dynamic analysis tool to extract inter-app interactions and permissions. Ahmad et al [156] Ancile Enforces use-based privacy for IoT application that use personal data. Bagdasaryan et al [157] Name is not defined Supports OWL and discover IoT devices based on passive broadcast and multicast packets.…”
Section: Snap4citymentioning
confidence: 99%
“…Table XI shows 13 tools, their brief descriptions, and relevant publications associated with the tools. Some of the tools support static and taint analysis to identify information sensitivity and to extract inter-app interactions and permissions [78]- [80], [156]. Some other tools help analyzing traffic data to investigate sensitive data flows and discover IoT devices based on passive broadcast and multicast packets [18], [64], [77].…”
Section: G Supported Toolsmentioning
confidence: 99%
“…Neisse et al [150] Name is not defined A static and dynamic analysis tool to extract inter-app interactions and permissions. Ahmad et al [156] Ancile Enforces use-based privacy for IoT application that use personal data. Bagdasaryan et al [157] Name is not defined Supports OWL and discover IoT devices based on passive broadcast and multicast packets.…”
Section: Snap4citymentioning
confidence: 99%