Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David A. Wagner 0001, Konstantin Beznosov |
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences. |
IEEE Symposium on Security and Privacy |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Gian Luca Scoccia, Ivano Malavolta, Marco Autili, Amleto Di Salle, Paola Inverardi |
User-centric Android flexible permissions. |
ICSE (Companion Volume) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Hannah Quay-de la Vallee |
On a (Per)Mission: Leveraging User Ratings of App Permissions to Help Users Manage Privacy. |
|
2017 |
RDF |
|
18 | Daniel Reichman 0002 |
Parallel Memory Permissions and Their Application. |
|
2017 |
RDF |
|
18 | Simon Parkinson, Andrew Crampton |
Identification of irregularities and allocation suggestion of relative file system permissions. |
J. Inf. Secur. Appl. |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Simon Parkinson, Vassiliki Somaraki, R. Ward |
Auditing file system permissions using association rule mining. |
Expert Syst. Appl. |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Hongmu Han, Ruixuan Li 0001, Xiwu Gu |
Identifying malicious Android apps using permissions and system events. |
Int. J. Embed. Syst. |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Jesse Elwell, Ryan Riley, Nael B. Abu-Ghazaleh, Dmitry V. Ponomarev, Iliano Cervesato |
Rethinking Memory Permissions for Protection Against Cross-Layer Attacks. |
ACM Trans. Archit. Code Optim. |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Patricia Aufderheide, Tijana Milosevic, Bryan Bello |
The impact of copyright permissions culture on the US visual arts community: The consequences of fear of fair use. |
New Media Soc. |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Xiaojian Liu, Lisheng Wang, Xinkao Liao |
基于CP-ABE和XACML多权限安全云存储访问控制方案 (Multiple Permissions Secure Access Control Scheme Combining CP-ABE and XACML in Cloud Storage). |
计算机科学 |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Xitao Wen, Bo Yang, Yan Chen 0004, Chengchen Hu, Yi Wang 0004, Bin Liu 0001, Xiaolin Chen |
SDNShield: Reconciliating Configurable Application Permissions for SDN App Markets. |
DSN |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Jason K. MacDuffie, Patricia A. Morreale |
Comparing Android App Permissions. |
HCI (18) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Panagiotis Andriotis, Martina Angela Sasse, Gianluca Stringhini |
Permissions snapshots: Assessing users' adaptation to the Android runtime permission model. |
WIFS |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Evgenii Pustozerov, Ute von Jan, Urs-Vito Albrecht |
Evaluation of mHealth Applications Security Based on Application Permissions. |
ICIMTH |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Arnaud Oglaza, Romain Laborde, Abdelmalek Benzekri, François Barrère |
A Recommender-Based System for Assisting Non-technical Users in Managing Android Permissions. |
ARES |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Md Yasser Karim, Huzefa H. Kagdi, Massimiliano Di Penta |
Mining Android Apps to Recommend Permissions. |
SANER |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Gradeigh D. Clark, Swapnil Sarode, Janne Lindqvist |
No time at all: opportunity cost of Android permissions (invited paper). |
HotWireless@MobiCom |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Ming-Yang Su, Kek-Tung Fung |
Detection of android malware by static analysis on permissions and sensitive functions. |
ICUFN |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Da Chen, Hongmei Zhang, Xiangli Zhang, Demin Wang |
Android Malicious Application Detection Based on Ontology Technology Integrated with Permissions and System Calls. |
IIKI |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Lingfeng Bao, David Lo 0001, Xin Xia 0001, Shanping Li |
What Permissions Should This Android App Request? |
SATE |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Matteo Cimini, Jeremy G. Siek |
Fractional Permissions for Race-Free Mutable References in a Dataflow Intermediate Language. |
PMLDC@ECOOP |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Jani Jokinen, Manu Bose Ambat, Jose L. Martinez Lastra |
Condition monitoring for distributed systems with reconfigurable user interfaces and data permissions. |
IECON |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Tim Baarslag, Alper T. Alan, Richard C. Gomer, Ilaria Liccardi, Helia Marreiros, Enrico H. Gerding, m. c. schraefel |
Negotiation as an Interaction Mechanism for Deciding App Permissions. |
CHI Extended Abstracts |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Bin Liu 0017, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Zhang, Norman M. Sadeh, Yuvraj Agarwal, Alessandro Acquisti |
Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. |
SOUPS |
2016 |
DBLP BibTeX RDF |
|
18 | Csaba Debreceni, Gábor Bergmann, István Ráth, Dániel Varró |
Deriving Effective Permissions for Modeling Artifacts from Fine-grained Access Control Rules. |
COMMitMDE@MoDELS |
2016 |
DBLP BibTeX RDF |
|
18 | Su Mon Kywe, Yingjiu Li, Kunal Petal, Michael Grace |
Attacking Android smartphone systems without permissions. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Asma Hamed, Hella Kaffel Ben Ayed |
Privacy risk assessment and users' awareness for mobile apps permissions. |
AICCSA |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Nicole Borrelli |
KISS On My List: Improving Platform Security and User Privacy by Simplifying the Android Permissions Model. |
Tiny Trans. Comput. Sci. |
2015 |
DBLP BibTeX RDF |
|
18 | Parisa Kaghazgaran, Hassan Takabi |
Toward an Insider Threat Detection Framework Using Honey Permissions. |
J. Internet Serv. Inf. Secur. |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David A. Wagner 0001, Konstantin Beznosov |
Android Permissions Remystified: A Field Study on Contextual Integrity. |
CoRR |
2015 |
DBLP BibTeX RDF |
|
18 | Albert J. J. Anglberger, Norbert Gratzl, Olivier Roy |
Obligation, Free Choice, and the Logic of Weakest Permissions. |
Rev. Symb. Log. |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Gabriel Ciobanu, Maciej Koutny, L. Jason Steggles |
Strategy based semantics for mobility with time and access permissions. |
Formal Aspects Comput. |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Naonobu Okazaki, Yoshihiro Kita, Kentaro Aburada, Mirang Park |
Security Evaluation System for Android Applications Using User's Reviews and Permissions. |
J. Robotics Netw. Artif. Life |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Gabriel Ciobanu, Maciej Koutny |
PerTiMo: A Model of Spatial Migration with Safe Access Permissions. |
Comput. J. |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Amir Rahmati, Harsha V. Madhyastha |
Context-Specific Access Control: Conforming Permissions With User Expectations. |
SPSM@CCS |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Simona Tiuc, Marius Marcu, Cosmin Cernazanu-Glavan |
Study on content rating and security permissions of mobile applications in google play. |
ISTAS |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Solomon Negash, Hossain Shahriar |
Mobile app permissions awareness. |
ICTA |
2015 |
DBLP DOI BibTeX RDF |
|
18 | John Haggerty, Thomas Hughes-Roberts, Robert Hegarty |
Hobson's Choice: Security and Privacy Permissions in Android and iOS Devices. |
HCI (22) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Kwangsik Song, Ah-Rim Han, Sehun Jeong, Sung Deok Cha |
Generating various contexts from permissions for testing Android applications. |
SEKE |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Gordon J. Pace, Fernando Schapachnik, Gerardo Schneider |
Conditional Permissions in Contracts. |
JURIX |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Guido Governatori, Mustafa Hashmi |
Permissions in Deontic Event-Calculus. |
JURIX |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Greig Paul, James Irvine 0001 |
Achieving Optional Android Permissions without Operating System Modifications. |
VTC Spring |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Alessandro Armando, Roberto Carbone, Gabriele Costa 0001, Alessio Merlo |
Android Permissions Unleashed. |
CSF |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David A. Wagner 0001, Konstantin Beznosov |
Android Permissions Remystified: A Field Study on Contextual Integrity. |
USENIX Security Symposium |
2015 |
DBLP BibTeX RDF |
|
18 | Yuan Zhang 0009, Min Yang 0002, Guofei Gu, Hao Chen 0003 |
FineDroid: Enforcing Permissions with System-Wide Application Execution Context. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Anthony Quattrone, Lars Kulik, Egemen Tanin, Kotagiri Ramamohanarao, Tao Gu |
PrivacyPalisade: Evaluating app permissions and building privacy into smartphones. |
ICICS |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Kevan Adlard, Tharanga Ekanayake, Ashraf Matrawy |
Towards power profiling of Android permissions. |
NTMS |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Yan-yan Lai, Quan Qian |
HBase fine grained access control with extended permissions and inheritable roles. |
SNPD |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Eric G. Mercer, Peter Anderson, Nick Vrvilo, Vivek Sarkar |
Model Checking Task Parallel Programs Using Gradual Permissions (N). |
ASE |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Samane Abdi |
Subterfuge-safe trust management for delegation of permissions in open environments. |
|
2015 |
RDF |
|
18 | Ilaria Liccardi, Joseph Pato, Daniel J. Weitzner |
Improving User Choice Through Better Mobile Apps Transparency and Permissions Analysis. |
J. Priv. Confidentiality |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Dong Hwi Lee, Byunghun Kim, Kuinam J. Kim |
PCA in ERP environment using the misuse detection system design and implementation of RBAC permissions. |
Multim. Tools Appl. |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Bojun Wang, Cheng Cai, Quan Zhou |
A Rational Threshold Signature Model and Protocol Based on Different Permissions. |
J. Appl. Math. |
2014 |
DBLP DOI BibTeX RDF |
|
18 | M. Hosseinkhani Loorak, Philip W. L. Fong, Sheelagh Carpendale |
Papilio: Visualizing Android Application Permissions. |
Comput. Graph. Forum |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Jesse Elwell, Ryan Riley, Nael B. Abu-Ghazaleh, Dmitry Ponomarev 0001 |
A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks. |
HPCA |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Nicky Robinson, Joseph Bonneau |
Cognitive disconnect: understanding facebook connect login permissions. |
COSN |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Huiqing Fu, Janne Lindqvist |
General Area or Approximate Location?: How People Understand Location Permissions. |
WPES |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Fauzia Idrees, Muttukrishnan Rajarajan |
Investigating the android intents and permissions for malware detection. |
WiMob |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Murat Ogul, Selçuk Baktir, Emin Islam Tatli |
Abused Android Permissions by Advertising Networks. |
ICITCS |
2014 |
DBLP DOI BibTeX RDF |
|
18 | John Tang Boyland, Peter Müller 0001, Malte Schwerhoff, Alexander J. Summers |
Constraint Semantics for Abstract Read Permissions. |
FTfJP@ECOOP |
2014 |
DBLP DOI BibTeX RDF |
|
18 | A. M. Aswini, P. Vinod 0001 |
Droid permission miner: Mining prominent permissions for Android malware analysis. |
ICADIWT |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Jiayu Wang, Qigeng Chen |
ASPG: Generating Android Semantic Permissions. |
CSE |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Jina Kang, Daehyun Kim, Hyoungshick Kim, Jun Ho Huh |
Analyzing Unnecessary Permissions Requested by Android Apps Based on Users' Opinions. |
WISA |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Quang Do, Ben Martini, Kim-Kwang Raymond Choo |
Enhancing User Privacy on Android Mobile Devices via Permissions Removal. |
HICSS |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Akanksha Sharma, Subrat Kumar Dash |
Mining API Calls and Permissions for Android Malware Detection. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Patrick P. K. Chan, Wen-Kai Song |
Static detection of Android malware by using permissions and API calls. |
ICMLC |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Mohammed Amir, Prashant Pillai, Yim-Fun Hu |
Cascading Permissions Policy Model for Token-Based Access Control in the Web of Things. |
FiCloud |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Sarah J. Wright, Wendy A. Kozlowski, Dianne Dietrich, Huda J. Khan, Gail Steinhart, Leslie D. McIntosh |
Drawing the Blueprint As We Build: Setting Up a Library-based Copyright and Permissions Service for MOOCs. |
D Lib Mag. |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Kapil Chalil Madathil, Reshmi Koikkara, Jihad S. Obeid, Joel S. Greenstein, Iain C. Sanderson, Katrina Fryar, Jay Moskowitz, Anand K. Gramopadhye |
An investigation of the efficacy of electronic consenting interfaces of research permissions management system in a hospital setting. |
Int. J. Medical Informatics |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Guido Governatori, Francesco Olivieri, Antonino Rotolo, Simone Scannapieco |
Computing Strong and Weak Permissions in Defeasible Logic. |
J. Philos. Log. |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Jonathan Protzenko, François Pottier |
Programming with Permissions in Mezzo. |
CoRR |
2013 |
DBLP BibTeX RDF |
|
18 | Todd Davies, Mike D. Mintz |
Relational Access Control with Bivalent Permissions in a Social Web/Collaboration Architecture |
CoRR |
2013 |
DBLP BibTeX RDF |
|
18 | Theodore Book, Adam Pridgen, Dan S. Wallach |
Longitudinal Analysis of Android Ad Library Permissions |
CoRR |
2013 |
DBLP BibTeX RDF |
|
18 | Simon Parkinson, Andrew Crampton |
A Novel Software Tool for Analysing NT File System Permissions. |
CoRR |
2013 |
DBLP BibTeX RDF |
|
18 | John Boyland |
Fractional Permissions. |
Aliasing in Object-Oriented Programming |
2013 |
DBLP DOI BibTeX RDF |
|
18 | James Sellwood, Jason Crampton |
Sleeping android: the danger of dormant permissions. |
SPSM@CCS |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Duy-Khanh Le, Wei-Ngan Chin, Yong Meng Teo |
Verification of Static and Dynamic Barrier Synchronization Using Bounded Permissions. |
ICFEM |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Gianpiero Costantino, Fabio Martinelli, Daniele Sgandurra |
How to grant less permissions to facebook applications. |
IAS |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Hannah Quay-de la Vallee, James M. Walsh, William Zimrin, Kathi Fisler, Shriram Krishnamurthi |
Usable security as a static-analysis problem: modeling and reasoning about user permissions in social-sharing systems. |
Onward! |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Suman Jana, David Molnar, Alexander Moshchuk, Alan M. Dunn, Benjamin Livshits, Helen J. Wang, Eyal Ofek |
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers. |
USENIX Security Symposium |
2013 |
DBLP BibTeX RDF |
|
18 | Kevin Benton, L. Jean Camp, Vaibhav Garg |
Studying the effectiveness of android application permissions requests. |
PerCom Workshops |
2013 |
DBLP DOI BibTeX RDF |
|
18 | François Pottier, Jonathan Protzenko |
Programming with permissions in Mezzo. |
ICFP |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Yang Wang, Jun Zheng 0003, Chen Sun, Srinivas Mukkamala |
Quantitative Security Risk Assessment of Android Permissions and Applications. |
DBSec |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Christoph M. Angerer |
Task-Aware Optimization of Dynamic Fractional Permissions. |
LCPC |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Radek Pospisil |
Authentication in computer networks and proposal of one-time increase of user permissions. |
TSP |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Shashank Holavanalli, Don Manuel, Vishwas Nanjundaswamy, Brian Rosenberg, Feng Shen, Steven Y. Ko, Lukasz Ziarek |
Flow Permissions for Android. |
ASE |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Sangho Lee, Da Young Ju |
Assessment of malicious applications using permissions and enhanced user interfaces on Android. |
ISI |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Tero Hasu, Anya Helene Bagge, Magne Haveraaen |
Inferring Required Permissions for Statically Composed Programs. |
NordSec |
2013 |
DBLP DOI BibTeX RDF |
|
18 | William J. Glodek, Richard E. Harang |
Rapid Permissions-Based Detection and Analysis of Mobile Malware Using Random Decision Forests. |
MILCOM |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Ryan Stevens, Jonathan Ganz, Vladimir Filkov, Premkumar T. Devanbu, Hao Chen 0003 |
Asking for (and about) permissions used by Android apps. |
MSR |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Chris Fox |
Obligations and Permissions. |
Lang. Linguistics Compass |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Lakshmi Priya Sekar, Vinitha Reddy Gankidi, Subramanian Selvakumar |
Avoidance of security breach through selective permissions in android operating system. |
ACM SIGSOFT Softw. Eng. Notes |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Brijesh Dongol, John Derrick, Ian J. Hayes |
Fractional Permissions and Non-Deterministic Evaluators in Interval Temporal Logic. |
Electron. Commun. Eur. Assoc. Softw. Sci. Technol. |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Radu I. Siminiceanu, Ijaz Ahmed, Néstor Cataño |
Automated Verification of Specifications with Typestates and Access Permissions. |
Electron. Commun. Eur. Assoc. Softw. Sci. Technol. |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Guido Governatori, Francesco Olivieri, Antonino Rotolo, Simone Scannapieco |
Computing Strong and Weak Permissions in Defeasible Logic |
CoRR |
2012 |
DBLP BibTeX RDF |
|
18 | Jaeyeon Jung, Seungyeop Han, David Wetherall |
Short paper: enhancing mobile application permissions with runtime feedback and constraints. |
SPSM@CCS |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Chaitrali Amrutkar, Patrick Traynor |
Short paper: rethinking permissions for mobile web apps: barriers and the road ahead. |
SPSM@CCS |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Jinseong Jeon, Kristopher K. Micinski, Jeffrey A. Vaughan, Ari Fogel, Nikhilesh Reddy, Jeffrey S. Foster, Todd D. Millstein |
Dr. Android and Mr. Hide: fine-grained permissions in android applications. |
SPSM@CCS |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Liu Yang, Nader Boushehrinejadmoradi, Pallab Roy, Vinod Ganapathy, Liviu Iftode |
Short paper: enhancing users' comprehension of android permissions. |
SPSM@CCS |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman M. Sadeh, David Wetherall |
A Conundrum of Permissions: Installing Applications on an Android Smartphone. |
Financial Cryptography Workshops |
2012 |
DBLP DOI BibTeX RDF |
|