Mobile applications obtain permissions from users to access device sensors and APIs. Once a user provides or denies permissions, the choice is permanent, unless the user chooses to change it manually and use of sensor data by the app is not within the user’s control. The techniques of this disclosure enable dynamic management of permissions provided to application software, e.g., mobile apps, based on user context. With user permission, a machine-learning model is trained based on contextual data and events, and corresponding app permission settings. The trained model provides predictions of when modifications to app permissions may be suitable. Based on the model predictions, users are notified to make such changes. If users permit, such p...
Despite corporate cyber intrusions attracting all the attention, privacy breaches that we, as ordina...
AbstractThe instantaneous growth of mobile apps in mobile markets elevating the concerns on the prot...
The Android permission mechanism prevents malicious application from accessing the mobile multimedia...
A permission model is described that provides a set of user modifiable default application permissio...
Users commonly provide permissions to software applications running on their personal computing devi...
Operating systems of computing devices include permission management features to grant software appl...
Permission systems are the main defense that mobile platforms, such as Android and iOS, offer to use...
In the runtime permission model, the context in which a permission is requested/used the first time ...
Users are burdened with the task of configuring access control policies on many dif- ferent applicat...
Current smartphone operating systems regulate application permissions by prompting users on an ask-o...
Current smartphone operating systems employ permission systems to regulate how apps access sensitive...
Despite corporate cyber intrusions attracting all the attention, privacy breaches that we, as ordina...
Existing mobile platforms are based on manual way of granting and revoking permissions to applicatio...
This publication describes methods that an application software market (application market) uses to ...
“To render the accurate information, at correct place in real period with custom-made setup and loca...
Despite corporate cyber intrusions attracting all the attention, privacy breaches that we, as ordina...
AbstractThe instantaneous growth of mobile apps in mobile markets elevating the concerns on the prot...
The Android permission mechanism prevents malicious application from accessing the mobile multimedia...
A permission model is described that provides a set of user modifiable default application permissio...
Users commonly provide permissions to software applications running on their personal computing devi...
Operating systems of computing devices include permission management features to grant software appl...
Permission systems are the main defense that mobile platforms, such as Android and iOS, offer to use...
In the runtime permission model, the context in which a permission is requested/used the first time ...
Users are burdened with the task of configuring access control policies on many dif- ferent applicat...
Current smartphone operating systems regulate application permissions by prompting users on an ask-o...
Current smartphone operating systems employ permission systems to regulate how apps access sensitive...
Despite corporate cyber intrusions attracting all the attention, privacy breaches that we, as ordina...
Existing mobile platforms are based on manual way of granting and revoking permissions to applicatio...
This publication describes methods that an application software market (application market) uses to ...
“To render the accurate information, at correct place in real period with custom-made setup and loca...
Despite corporate cyber intrusions attracting all the attention, privacy breaches that we, as ordina...
AbstractThe instantaneous growth of mobile apps in mobile markets elevating the concerns on the prot...
The Android permission mechanism prevents malicious application from accessing the mobile multimedia...