2012 IEEE Sixth International Conference on Software Security and Reliability 2012
DOI: 10.1109/sere.2012.14
|View full text |Cite
|
Sign up to set email alerts
|

Flexible Data-Driven Security for Android

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 19 publications
(34 citation statements)
references
References 18 publications
0
34
0
Order By: Relevance
“…While the problem of enforcing usage control requirements within single independent systems has been and is being researched [55,74,147,170,174,216], these solutions fall short when it comes to today's interconnected computing systems, in which data is not only independently processed by single systems, but rather by distributed cooperating systems and applications. Even in the presence of such distributed data processing, data owners would like to enforce data usage control policies after the data has been released for means of storage, processing, and further dissemination.…”
Section: Gap Analysis and Research Questionmentioning
confidence: 99%
See 3 more Smart Citations
“…While the problem of enforcing usage control requirements within single independent systems has been and is being researched [55,74,147,170,174,216], these solutions fall short when it comes to today's interconnected computing systems, in which data is not only independently processed by single systems, but rather by distributed cooperating systems and applications. Even in the presence of such distributed data processing, data owners would like to enforce data usage control policies after the data has been released for means of storage, processing, and further dissemination.…”
Section: Gap Analysis and Research Questionmentioning
confidence: 99%
“…This thesis will further build on this instantiation in Section 3.2.2. Instantiations for other operating system layers have been shown to be similar [55,214,216]. In particular, the concepts described in the following can be directly applied to any other Unix-like system such as Linux.…”
Section: Instantiation To Unix-like Systemsmentioning
confidence: 99%
See 2 more Smart Citations
“…TaintDroid aims to give visibility to device users over how their sensitive data is handled by smartphone applications at runtime at the level of variables, methods, file operations and messages among applications. Other than work building up on TaintDroid [1,13,6], very few papers on privacy mechanisms consider the "private data over the untrusted network" aspect: Smokescreen [3] is a privacy management system that uses different broadcast signals to allow users to control how they share their location with social contacts differently than with strangers. Mobishare [15] protects privacy in mobile online social networks, whereby the user location is anonymised and obscured when using untrusted location servers.…”
Section: State Of the Artmentioning
confidence: 99%