2015 IEEE Trustcom/BigDataSE/Ispa 2015
DOI: 10.1109/trustcom.2015.353
|View full text |Cite
|
Sign up to set email alerts
|

Trust Evaluation in Mobile Devices: An Empirical Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…In the research paper Yao et al [7], the authors measure battery parameters like voltage, temperature and battery power while evaluating encryption algorithms. In the research paper Weiss et al [8] measured system parameters, battery voltage, CPU utilization, network communications for individual apps to detect malicious code. They measured network communication and analyses using tcpdump whether communication performed is secure or not, ratio of incoming traffic to outgoing traffic and third party traffic.…”
Section: Related Workmentioning
confidence: 99%
“…In the research paper Yao et al [7], the authors measure battery parameters like voltage, temperature and battery power while evaluating encryption algorithms. In the research paper Weiss et al [8] measured system parameters, battery voltage, CPU utilization, network communications for individual apps to detect malicious code. They measured network communication and analyses using tcpdump whether communication performed is secure or not, ratio of incoming traffic to outgoing traffic and third party traffic.…”
Section: Related Workmentioning
confidence: 99%
“…As our dependency on smartphones rises, so ensures our experience to security threats. Hence, the security level of apps downloaded on our smartphones must be a priority for us because Applications represent the largest security and privacy risk to a device and user's data [32]. For this purpose, users tend to evaluate the app's security level primitively by using some risk indicators such as the developer's reputation, the number of downloads of the application, the app rating, and the user reviews.…”
Section: Proposalmentioning
confidence: 99%
“…Risk can be assessed using a hierarchical method of trust assessment. This allows users to combine trust indicators and to check the metric of trust for each component of the mobile system [12]. The Russian approach described in the standards also uses this principle [13].…”
Section: The Risks Of Leakage Of Confidential User Informationmentioning
confidence: 99%
“…In Russia, legal norms and regulatory standards are divided and inconsistent, that are lead to ineffective information security. The various ways of ensuring information security are offered, for example, by confirming each software change [9], flexible phone settings [10], testing installed applications on the phone [11], by checking the trust metric for each component of the mobile system [12]. Basically, regulation is provided at the level of technology development through the use of mandatory standards.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation