The use of smartphones and tablet devices has grown rapidly over recent years and the widespread availability of software, often from unknown developers, has led to security and privacy concerns. In order to prevent security compromises, these devices use access control as a means by which a user is able to specify an application’s ability to interact with services and data. However, the use of access control as a security countermeasure in this environment is severely limited. For example, once permissions are granted to software, they may share data, such as location or unique identifiers with third persons without informing the user, whether or not the application is itself running. This paper presents the results of a comparative study ...
Smart-phones are today used to perform a huge amount of online activities. They are used as interfac...
Consumers and organizations often rely on permissions requested during the installation of mobile ap...
Mobile usage has become a part of our daily lives. However, many mobile users ignore the existence o...
Abstract The use of smartphones and tablet devices has grown rapidly over recent years and the wid...
Many smartphone operating systems implement strong sandboxing for 3rd party application software. As...
Abstract — More and more people rely on smart phones to manage their personal data. Smartphone'...
As they compete for developers, mobile app ecosystems have been exposing a growing number of APIs th...
Smartphones have become ubiquitous in our society. With a large number of users spending more time a...
by Google in the form of an unrestricted grant to the Mobile Commerce Laboratory. The authors would ...
Smartphones have gained a high popularity worldwide. Many of smartphone users utilize the feature wh...
App permission requests are a control mechanism meant to help users oversee and safeguard access to ...
The increasing popularity of the Android OS has resulted in its user base surging past 2.5 billion m...
As they compete for developers, mobile app ecosystems have been exposing a growing number of APIs th...
Mobile platforms, such as Android, iOS, and Windows, are gaining more and more relevance within end ...
Despite corporate cyber intrusions attracting all the attention, privacy breaches that we, as ordina...
Smart-phones are today used to perform a huge amount of online activities. They are used as interfac...
Consumers and organizations often rely on permissions requested during the installation of mobile ap...
Mobile usage has become a part of our daily lives. However, many mobile users ignore the existence o...
Abstract The use of smartphones and tablet devices has grown rapidly over recent years and the wid...
Many smartphone operating systems implement strong sandboxing for 3rd party application software. As...
Abstract — More and more people rely on smart phones to manage their personal data. Smartphone'...
As they compete for developers, mobile app ecosystems have been exposing a growing number of APIs th...
Smartphones have become ubiquitous in our society. With a large number of users spending more time a...
by Google in the form of an unrestricted grant to the Mobile Commerce Laboratory. The authors would ...
Smartphones have gained a high popularity worldwide. Many of smartphone users utilize the feature wh...
App permission requests are a control mechanism meant to help users oversee and safeguard access to ...
The increasing popularity of the Android OS has resulted in its user base surging past 2.5 billion m...
As they compete for developers, mobile app ecosystems have been exposing a growing number of APIs th...
Mobile platforms, such as Android, iOS, and Windows, are gaining more and more relevance within end ...
Despite corporate cyber intrusions attracting all the attention, privacy breaches that we, as ordina...
Smart-phones are today used to perform a huge amount of online activities. They are used as interfac...
Consumers and organizations often rely on permissions requested during the installation of mobile ap...
Mobile usage has become a part of our daily lives. However, many mobile users ignore the existence o...