Permission-based security models are common in smartphone operating systems. Such models implement access control for sensitive APIs, introducing an additional concern for application developers. It is important for the correct set of permissions to be declared for an application, as too small a set is likely to result in runtime errors, whereas too large a set may needlessly worry users. Unfortunately, not all platform vendors provide tools support to assist in determining the set of permissions that an application requires. We present a language-based solution for permission management. It entails the specification of permission information within a collection of source code, and allows for the inference of permission requirements for a c...
This publication describes methods that an application software market (application market) uses to ...
This paper presents an access control model for programming applications in which the access control...
Modern smartphone operating systems (OSs) have been developed with a greater emphasis on security an...
peer reviewedIn the permission-based security model (used e.g. in An- droid and Blackberry), appli...
How can we, as platform designers, protect computer users from the threats associated with malicious...
Operating systems of computing devices include permission management features to grant software appl...
Mobile applications build part of their security and privacy on a declarative permission model. In t...
Application platforms provide applications with accessto hardware (e.g., GPS and cameras) and person...
A common security architecture, called the permission-based security model (used e.g. in Android and...
Many smartphone operating systems implement strong sandboxing for 3rd party application software. As...
International audienceWriting a platform for reactive applications which enforces operational constr...
A permission model is described that provides a set of user modifiable default application permissio...
peer reviewedA common security architecture is based on the protection of certain resources by permi...
Mobile applications obtain permissions from users to access device sensors and APIs. Once a user pro...
In this work we present a comprehensive formal specification of an idealized formulation of Android?...
This publication describes methods that an application software market (application market) uses to ...
This paper presents an access control model for programming applications in which the access control...
Modern smartphone operating systems (OSs) have been developed with a greater emphasis on security an...
peer reviewedIn the permission-based security model (used e.g. in An- droid and Blackberry), appli...
How can we, as platform designers, protect computer users from the threats associated with malicious...
Operating systems of computing devices include permission management features to grant software appl...
Mobile applications build part of their security and privacy on a declarative permission model. In t...
Application platforms provide applications with accessto hardware (e.g., GPS and cameras) and person...
A common security architecture, called the permission-based security model (used e.g. in Android and...
Many smartphone operating systems implement strong sandboxing for 3rd party application software. As...
International audienceWriting a platform for reactive applications which enforces operational constr...
A permission model is described that provides a set of user modifiable default application permissio...
peer reviewedA common security architecture is based on the protection of certain resources by permi...
Mobile applications obtain permissions from users to access device sensors and APIs. Once a user pro...
In this work we present a comprehensive formal specification of an idealized formulation of Android?...
This publication describes methods that an application software market (application market) uses to ...
This paper presents an access control model for programming applications in which the access control...
Modern smartphone operating systems (OSs) have been developed with a greater emphasis on security an...