2012 IEEE 13th International Conference on Mobile Data Management 2012
DOI: 10.1109/mdm.2012.50
|View full text |Cite
|
Sign up to set email alerts
|

Securing Enterprise Data on Smartphones Using Run Time Information Flow Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Various already present solutions has a provision to support encryption of full disk with plausible deniability in the released desktop operating system. True Crypt [8] is a well known system among the PDE tools. To the best of our knowledge, Mobiflage [9] is the first PDE system for android devices, and it is implemented based on a physical or emulated SD card with a FAT32 file system.…”
Section: Techniques Used For Detection and Security Of Theft Android mentioning
confidence: 99%
“…Various already present solutions has a provision to support encryption of full disk with plausible deniability in the released desktop operating system. True Crypt [8] is a well known system among the PDE tools. To the best of our knowledge, Mobiflage [9] is the first PDE system for android devices, and it is implemented based on a physical or emulated SD card with a FAT32 file system.…”
Section: Techniques Used For Detection and Security Of Theft Android mentioning
confidence: 99%
“…In this work, the authors state that the privacy of users and smartphone under this framework are protected using embedded semantic policies that are based on the user's privacy and settings [30]. Kodeswaran et al [31] have shown a framework to execute the privacy policies on smartphones, and to protect the enterprise data. The authors have defined their privacy policies of acceptable information flow on mobile devices.…”
Section: B Data Protection and Privacymentioning
confidence: 99%
“…They purpose detection malicious data access approach for data protection and upgrade the lock screen system for smartphone authentication. The [30] and [31], articles provide a framework to execute privacy policies to protect user data and enterprise data.…”
Section: Performance Comparisonmentioning
confidence: 99%