The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for permissions with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1998 (18) 1999-2000 (18) 2001 (20) 2002 (25) 2003 (41) 2004 (42) 2005 (50) 2006 (53) 2007 (59) 2008 (64) 2009 (43) 2010 (16) 2011 (16) 2012 (25) 2013 (24) 2014 (18) 2015 (23) 2016 (23) 2017 (25) 2018 (29) 2019 (22) 2020 (20) 2021 (31) 2022 (25) 2023 (19) 2024 (2)
Publication types (Num. hits)
article(155) data(2) incollection(5) inproceedings(576) phdthesis(13)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 519 occurrences of 282 keywords

Results
Found 751 publication records. Showing 751 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David A. Wagner 0001, Konstantin Beznosov The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Gian Luca Scoccia, Ivano Malavolta, Marco Autili, Amleto Di Salle, Paola Inverardi User-centric Android flexible permissions. Search on Bibsonomy ICSE (Companion Volume) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
18Hannah Quay-de la Vallee On a (Per)Mission: Leveraging User Ratings of App Permissions to Help Users Manage Privacy. Search on Bibsonomy 2017   RDF
18Daniel Reichman 0002 Parallel Memory Permissions and Their Application. Search on Bibsonomy 2017   RDF
18Simon Parkinson, Andrew Crampton Identification of irregularities and allocation suggestion of relative file system permissions. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Simon Parkinson, Vassiliki Somaraki, R. Ward Auditing file system permissions using association rule mining. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Hongmu Han, Ruixuan Li 0001, Xiwu Gu Identifying malicious Android apps using permissions and system events. Search on Bibsonomy Int. J. Embed. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Jesse Elwell, Ryan Riley, Nael B. Abu-Ghazaleh, Dmitry V. Ponomarev, Iliano Cervesato Rethinking Memory Permissions for Protection Against Cross-Layer Attacks. Search on Bibsonomy ACM Trans. Archit. Code Optim. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Patricia Aufderheide, Tijana Milosevic, Bryan Bello The impact of copyright permissions culture on the US visual arts community: The consequences of fear of fair use. Search on Bibsonomy New Media Soc. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Xiaojian Liu, Lisheng Wang, Xinkao Liao 基于CP-ABE和XACML多权限安全云存储访问控制方案 (Multiple Permissions Secure Access Control Scheme Combining CP-ABE and XACML in Cloud Storage). Search on Bibsonomy 计算机科学 The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Xitao Wen, Bo Yang, Yan Chen 0004, Chengchen Hu, Yi Wang 0004, Bin Liu 0001, Xiaolin Chen SDNShield: Reconciliating Configurable Application Permissions for SDN App Markets. Search on Bibsonomy DSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Jason K. MacDuffie, Patricia A. Morreale Comparing Android App Permissions. Search on Bibsonomy HCI (18) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Panagiotis Andriotis, Martina Angela Sasse, Gianluca Stringhini Permissions snapshots: Assessing users' adaptation to the Android runtime permission model. Search on Bibsonomy WIFS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Evgenii Pustozerov, Ute von Jan, Urs-Vito Albrecht Evaluation of mHealth Applications Security Based on Application Permissions. Search on Bibsonomy ICIMTH The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Arnaud Oglaza, Romain Laborde, Abdelmalek Benzekri, François Barrère A Recommender-Based System for Assisting Non-technical Users in Managing Android Permissions. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Md Yasser Karim, Huzefa H. Kagdi, Massimiliano Di Penta Mining Android Apps to Recommend Permissions. Search on Bibsonomy SANER The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Gradeigh D. Clark, Swapnil Sarode, Janne Lindqvist No time at all: opportunity cost of Android permissions (invited paper). Search on Bibsonomy HotWireless@MobiCom The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Ming-Yang Su, Kek-Tung Fung Detection of android malware by static analysis on permissions and sensitive functions. Search on Bibsonomy ICUFN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Da Chen, Hongmei Zhang, Xiangli Zhang, Demin Wang Android Malicious Application Detection Based on Ontology Technology Integrated with Permissions and System Calls. Search on Bibsonomy IIKI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Lingfeng Bao, David Lo 0001, Xin Xia 0001, Shanping Li What Permissions Should This Android App Request? Search on Bibsonomy SATE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Matteo Cimini, Jeremy G. Siek Fractional Permissions for Race-Free Mutable References in a Dataflow Intermediate Language. Search on Bibsonomy PMLDC@ECOOP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Jani Jokinen, Manu Bose Ambat, Jose L. Martinez Lastra Condition monitoring for distributed systems with reconfigurable user interfaces and data permissions. Search on Bibsonomy IECON The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Tim Baarslag, Alper T. Alan, Richard C. Gomer, Ilaria Liccardi, Helia Marreiros, Enrico H. Gerding, m. c. schraefel Negotiation as an Interaction Mechanism for Deciding App Permissions. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Bin Liu 0017, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Zhang, Norman M. Sadeh, Yuvraj Agarwal, Alessandro Acquisti Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. Search on Bibsonomy SOUPS The full citation details ... 2016 DBLP  BibTeX  RDF
18Csaba Debreceni, Gábor Bergmann, István Ráth, Dániel Varró Deriving Effective Permissions for Modeling Artifacts from Fine-grained Access Control Rules. Search on Bibsonomy COMMitMDE@MoDELS The full citation details ... 2016 DBLP  BibTeX  RDF
18Su Mon Kywe, Yingjiu Li, Kunal Petal, Michael Grace Attacking Android smartphone systems without permissions. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Asma Hamed, Hella Kaffel Ben Ayed Privacy risk assessment and users' awareness for mobile apps permissions. Search on Bibsonomy AICCSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
18Nicole Borrelli KISS On My List: Improving Platform Security and User Privacy by Simplifying the Android Permissions Model. Search on Bibsonomy Tiny Trans. Comput. Sci. The full citation details ... 2015 DBLP  BibTeX  RDF
18Parisa Kaghazgaran, Hassan Takabi Toward an Insider Threat Detection Framework Using Honey Permissions. Search on Bibsonomy J. Internet Serv. Inf. Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David A. Wagner 0001, Konstantin Beznosov Android Permissions Remystified: A Field Study on Contextual Integrity. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
18Albert J. J. Anglberger, Norbert Gratzl, Olivier Roy Obligation, Free Choice, and the Logic of Weakest Permissions. Search on Bibsonomy Rev. Symb. Log. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Gabriel Ciobanu, Maciej Koutny, L. Jason Steggles Strategy based semantics for mobility with time and access permissions. Search on Bibsonomy Formal Aspects Comput. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Naonobu Okazaki, Yoshihiro Kita, Kentaro Aburada, Mirang Park Security Evaluation System for Android Applications Using User's Reviews and Permissions. Search on Bibsonomy J. Robotics Netw. Artif. Life The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Gabriel Ciobanu, Maciej Koutny PerTiMo: A Model of Spatial Migration with Safe Access Permissions. Search on Bibsonomy Comput. J. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Amir Rahmati, Harsha V. Madhyastha Context-Specific Access Control: Conforming Permissions With User Expectations. Search on Bibsonomy SPSM@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Simona Tiuc, Marius Marcu, Cosmin Cernazanu-Glavan Study on content rating and security permissions of mobile applications in google play. Search on Bibsonomy ISTAS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Solomon Negash, Hossain Shahriar Mobile app permissions awareness. Search on Bibsonomy ICTA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18John Haggerty, Thomas Hughes-Roberts, Robert Hegarty Hobson's Choice: Security and Privacy Permissions in Android and iOS Devices. Search on Bibsonomy HCI (22) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Kwangsik Song, Ah-Rim Han, Sehun Jeong, Sung Deok Cha Generating various contexts from permissions for testing Android applications. Search on Bibsonomy SEKE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Gordon J. Pace, Fernando Schapachnik, Gerardo Schneider Conditional Permissions in Contracts. Search on Bibsonomy JURIX The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Guido Governatori, Mustafa Hashmi Permissions in Deontic Event-Calculus. Search on Bibsonomy JURIX The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Greig Paul, James Irvine 0001 Achieving Optional Android Permissions without Operating System Modifications. Search on Bibsonomy VTC Spring The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Alessandro Armando, Roberto Carbone, Gabriele Costa 0001, Alessio Merlo Android Permissions Unleashed. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David A. Wagner 0001, Konstantin Beznosov Android Permissions Remystified: A Field Study on Contextual Integrity. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2015 DBLP  BibTeX  RDF
18Yuan Zhang 0009, Min Yang 0002, Guofei Gu, Hao Chen 0003 FineDroid: Enforcing Permissions with System-Wide Application Execution Context. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Anthony Quattrone, Lars Kulik, Egemen Tanin, Kotagiri Ramamohanarao, Tao Gu PrivacyPalisade: Evaluating app permissions and building privacy into smartphones. Search on Bibsonomy ICICS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Kevan Adlard, Tharanga Ekanayake, Ashraf Matrawy Towards power profiling of Android permissions. Search on Bibsonomy NTMS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Yan-yan Lai, Quan Qian HBase fine grained access control with extended permissions and inheritable roles. Search on Bibsonomy SNPD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Eric G. Mercer, Peter Anderson, Nick Vrvilo, Vivek Sarkar Model Checking Task Parallel Programs Using Gradual Permissions (N). Search on Bibsonomy ASE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Samane Abdi Subterfuge-safe trust management for delegation of permissions in open environments. Search on Bibsonomy 2015   RDF
18Ilaria Liccardi, Joseph Pato, Daniel J. Weitzner Improving User Choice Through Better Mobile Apps Transparency and Permissions Analysis. Search on Bibsonomy J. Priv. Confidentiality The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Dong Hwi Lee, Byunghun Kim, Kuinam J. Kim PCA in ERP environment using the misuse detection system design and implementation of RBAC permissions. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Bojun Wang, Cheng Cai, Quan Zhou A Rational Threshold Signature Model and Protocol Based on Different Permissions. Search on Bibsonomy J. Appl. Math. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18M. Hosseinkhani Loorak, Philip W. L. Fong, Sheelagh Carpendale Papilio: Visualizing Android Application Permissions. Search on Bibsonomy Comput. Graph. Forum The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Jesse Elwell, Ryan Riley, Nael B. Abu-Ghazaleh, Dmitry Ponomarev 0001 A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks. Search on Bibsonomy HPCA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Nicky Robinson, Joseph Bonneau Cognitive disconnect: understanding facebook connect login permissions. Search on Bibsonomy COSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Huiqing Fu, Janne Lindqvist General Area or Approximate Location?: How People Understand Location Permissions. Search on Bibsonomy WPES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Fauzia Idrees, Muttukrishnan Rajarajan Investigating the android intents and permissions for malware detection. Search on Bibsonomy WiMob The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Murat Ogul, Selçuk Baktir, Emin Islam Tatli Abused Android Permissions by Advertising Networks. Search on Bibsonomy ICITCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18John Tang Boyland, Peter Müller 0001, Malte Schwerhoff, Alexander J. Summers Constraint Semantics for Abstract Read Permissions. Search on Bibsonomy FTfJP@ECOOP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18A. M. Aswini, P. Vinod 0001 Droid permission miner: Mining prominent permissions for Android malware analysis. Search on Bibsonomy ICADIWT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Jiayu Wang, Qigeng Chen ASPG: Generating Android Semantic Permissions. Search on Bibsonomy CSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Jina Kang, Daehyun Kim, Hyoungshick Kim, Jun Ho Huh Analyzing Unnecessary Permissions Requested by Android Apps Based on Users' Opinions. Search on Bibsonomy WISA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Quang Do, Ben Martini, Kim-Kwang Raymond Choo Enhancing User Privacy on Android Mobile Devices via Permissions Removal. Search on Bibsonomy HICSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Akanksha Sharma, Subrat Kumar Dash Mining API Calls and Permissions for Android Malware Detection. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Patrick P. K. Chan, Wen-Kai Song Static detection of Android malware by using permissions and API calls. Search on Bibsonomy ICMLC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Mohammed Amir, Prashant Pillai, Yim-Fun Hu Cascading Permissions Policy Model for Token-Based Access Control in the Web of Things. Search on Bibsonomy FiCloud The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Sarah J. Wright, Wendy A. Kozlowski, Dianne Dietrich, Huda J. Khan, Gail Steinhart, Leslie D. McIntosh Drawing the Blueprint As We Build: Setting Up a Library-based Copyright and Permissions Service for MOOCs. Search on Bibsonomy D Lib Mag. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Kapil Chalil Madathil, Reshmi Koikkara, Jihad S. Obeid, Joel S. Greenstein, Iain C. Sanderson, Katrina Fryar, Jay Moskowitz, Anand K. Gramopadhye An investigation of the efficacy of electronic consenting interfaces of research permissions management system in a hospital setting. Search on Bibsonomy Int. J. Medical Informatics The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Guido Governatori, Francesco Olivieri, Antonino Rotolo, Simone Scannapieco Computing Strong and Weak Permissions in Defeasible Logic. Search on Bibsonomy J. Philos. Log. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Jonathan Protzenko, François Pottier Programming with Permissions in Mezzo. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
18Todd Davies, Mike D. Mintz Relational Access Control with Bivalent Permissions in a Social Web/Collaboration Architecture Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
18Theodore Book, Adam Pridgen, Dan S. Wallach Longitudinal Analysis of Android Ad Library Permissions Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
18Simon Parkinson, Andrew Crampton A Novel Software Tool for Analysing NT File System Permissions. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
18John Boyland Fractional Permissions. Search on Bibsonomy Aliasing in Object-Oriented Programming The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18James Sellwood, Jason Crampton Sleeping android: the danger of dormant permissions. Search on Bibsonomy SPSM@CCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Duy-Khanh Le, Wei-Ngan Chin, Yong Meng Teo Verification of Static and Dynamic Barrier Synchronization Using Bounded Permissions. Search on Bibsonomy ICFEM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Gianpiero Costantino, Fabio Martinelli, Daniele Sgandurra How to grant less permissions to facebook applications. Search on Bibsonomy IAS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Hannah Quay-de la Vallee, James M. Walsh, William Zimrin, Kathi Fisler, Shriram Krishnamurthi Usable security as a static-analysis problem: modeling and reasoning about user permissions in social-sharing systems. Search on Bibsonomy Onward! The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Suman Jana, David Molnar, Alexander Moshchuk, Alan M. Dunn, Benjamin Livshits, Helen J. Wang, Eyal Ofek Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2013 DBLP  BibTeX  RDF
18Kevin Benton, L. Jean Camp, Vaibhav Garg Studying the effectiveness of android application permissions requests. Search on Bibsonomy PerCom Workshops The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18François Pottier, Jonathan Protzenko Programming with permissions in Mezzo. Search on Bibsonomy ICFP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Yang Wang, Jun Zheng 0003, Chen Sun, Srinivas Mukkamala Quantitative Security Risk Assessment of Android Permissions and Applications. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Christoph M. Angerer Task-Aware Optimization of Dynamic Fractional Permissions. Search on Bibsonomy LCPC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Radek Pospisil Authentication in computer networks and proposal of one-time increase of user permissions. Search on Bibsonomy TSP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Shashank Holavanalli, Don Manuel, Vishwas Nanjundaswamy, Brian Rosenberg, Feng Shen, Steven Y. Ko, Lukasz Ziarek Flow Permissions for Android. Search on Bibsonomy ASE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Sangho Lee, Da Young Ju Assessment of malicious applications using permissions and enhanced user interfaces on Android. Search on Bibsonomy ISI The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Tero Hasu, Anya Helene Bagge, Magne Haveraaen Inferring Required Permissions for Statically Composed Programs. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18William J. Glodek, Richard E. Harang Rapid Permissions-Based Detection and Analysis of Mobile Malware Using Random Decision Forests. Search on Bibsonomy MILCOM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Ryan Stevens, Jonathan Ganz, Vladimir Filkov, Premkumar T. Devanbu, Hao Chen 0003 Asking for (and about) permissions used by Android apps. Search on Bibsonomy MSR The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Chris Fox Obligations and Permissions. Search on Bibsonomy Lang. Linguistics Compass The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Lakshmi Priya Sekar, Vinitha Reddy Gankidi, Subramanian Selvakumar Avoidance of security breach through selective permissions in android operating system. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Brijesh Dongol, John Derrick, Ian J. Hayes Fractional Permissions and Non-Deterministic Evaluators in Interval Temporal Logic. Search on Bibsonomy Electron. Commun. Eur. Assoc. Softw. Sci. Technol. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Radu I. Siminiceanu, Ijaz Ahmed, Néstor Cataño Automated Verification of Specifications with Typestates and Access Permissions. Search on Bibsonomy Electron. Commun. Eur. Assoc. Softw. Sci. Technol. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Guido Governatori, Francesco Olivieri, Antonino Rotolo, Simone Scannapieco Computing Strong and Weak Permissions in Defeasible Logic Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
18Jaeyeon Jung, Seungyeop Han, David Wetherall Short paper: enhancing mobile application permissions with runtime feedback and constraints. Search on Bibsonomy SPSM@CCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Chaitrali Amrutkar, Patrick Traynor Short paper: rethinking permissions for mobile web apps: barriers and the road ahead. Search on Bibsonomy SPSM@CCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Jinseong Jeon, Kristopher K. Micinski, Jeffrey A. Vaughan, Ari Fogel, Nikhilesh Reddy, Jeffrey S. Foster, Todd D. Millstein Dr. Android and Mr. Hide: fine-grained permissions in android applications. Search on Bibsonomy SPSM@CCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Liu Yang, Nader Boushehrinejadmoradi, Pallab Roy, Vinod Ganapathy, Liviu Iftode Short paper: enhancing users' comprehension of android permissions. Search on Bibsonomy SPSM@CCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman M. Sadeh, David Wetherall A Conundrum of Permissions: Installing Applications on an Android Smartphone. Search on Bibsonomy Financial Cryptography Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 751 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license