Existing mobile platforms are based on manual way of granting and revoking permissions to applications. Once the user grants a given permission to an application, the application can use it without limit, unless the user manually revokes the permission. This has become the reason for many privacy problems because of the fact that a permission that is harmless at some occasion may be very dangerous at another condition. One of the promising solutions for this problem is context-aware access control at permission level that allows dynamic granting and denying of permissions based on some predefined context. However, dealing with policy configuration at permission level becomes very complex for the user as the number of policies to configure w...
The security of smart phones is increasingly important due to their rapid popularity. Mobile computi...
Despite corporate cyber intrusions attracting all the attention, privacy breaches that we, as ordina...
Current smartphone systems allow the user to use only marginally contextual information to specify t...
Existing mobile platforms are based on manual way of granting and revoking permissions to applicatio...
Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2016Includes bibliograp...
Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2016Includes bibliograp...
Today, permissions management solutions on mobile devices employ Identity Based Access Control (IBAC...
Thesis (M.S.)--Boston UniversityAndroid, as an open platform, dominates the booming mobile market. H...
Today, permissions management solutions on mobile devices employ Identity Based Access Control (IBAC...
Today, permissions management solutions on mobile devices employ Identity Based Access Control (IBAC...
This paper has three goals: to improve our understanding of enforcing security policies via Android-...
International audiencePermission systems are the main defense that mobile platforms, such as Android...
International audienceToday, permissions management solutions on mobile devices employ Identity Base...
Despite corporate cyber intrusions attracting all the attention, privacy breaches that we, as ordina...
Despite corporate cyber intrusions attracting all the attention, privacy breaches that we, as ordina...
The security of smart phones is increasingly important due to their rapid popularity. Mobile computi...
Despite corporate cyber intrusions attracting all the attention, privacy breaches that we, as ordina...
Current smartphone systems allow the user to use only marginally contextual information to specify t...
Existing mobile platforms are based on manual way of granting and revoking permissions to applicatio...
Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2016Includes bibliograp...
Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2016Includes bibliograp...
Today, permissions management solutions on mobile devices employ Identity Based Access Control (IBAC...
Thesis (M.S.)--Boston UniversityAndroid, as an open platform, dominates the booming mobile market. H...
Today, permissions management solutions on mobile devices employ Identity Based Access Control (IBAC...
Today, permissions management solutions on mobile devices employ Identity Based Access Control (IBAC...
This paper has three goals: to improve our understanding of enforcing security policies via Android-...
International audiencePermission systems are the main defense that mobile platforms, such as Android...
International audienceToday, permissions management solutions on mobile devices employ Identity Base...
Despite corporate cyber intrusions attracting all the attention, privacy breaches that we, as ordina...
Despite corporate cyber intrusions attracting all the attention, privacy breaches that we, as ordina...
The security of smart phones is increasingly important due to their rapid popularity. Mobile computi...
Despite corporate cyber intrusions attracting all the attention, privacy breaches that we, as ordina...
Current smartphone systems allow the user to use only marginally contextual information to specify t...