A methodology for empirical analysis of permission-based security models and its application to android

作者: David Barrera , H. G üne ş Kayacik , Paul C. van Oorschot , Anil Somayaji

DOI: 10.1145/1866307.1866317

关键词:

摘要: Permission-based security models provide controlled access to various system resources. The expressiveness of the permission set plays an important role in providing the right level of …

参考文章(11)
Stephen G Kochan, Patrick H Wood, Unix System Security ,(1986)
Aaron Boodman, Adrienne Porter Felt, Prateek Saxena, Adam Barth, Protecting Browsers from Extension Vulnerabilities network and distributed system security symposium. ,(2010)
Teuvo Kohonen, Self-Organizing Maps ,(1995)
William Enck, Machigar Ongtang, Patrick McDaniel, On lightweight mobile phone application certification computer and communications security. pp. 235- 245 ,(2009) , 10.1145/1653662.1653691
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kelli Bacon, Keisha How, Heather Strong, Expandable grids for visualizing and authoring computer security policies Proceeding of the twenty-sixth annual CHI conference on Human factors in computing systems - CHI '08. pp. 1473- 1482 ,(2008) , 10.1145/1357054.1357285
Konstantin Beznosov, Philip Inglesant, Jorge Lobo, Rob Reeder, Mary Ellen Zurko, Usability meets access control Proceedings of the 14th ACM symposium on Access control models and technologies - SACMAT '09. pp. 73- 74 ,(2009) , 10.1145/1542207.1542220
William Enck, Machigar Ongtang, Patrick McDaniel, Understanding Android Security ieee symposium on security and privacy. ,vol. 7, pp. 50- 57 ,(2009) , 10.1109/MSP.2009.26
D. K. Smetters, Nathan Good, How users use access control Proceedings of the 5th Symposium on Usable Privacy and Security - SOUPS '09. pp. 15- ,(2009) , 10.1145/1572532.1572552
Machigar Ongtang, Stephen McLaughlin, William Enck, Patrick McDaniel, Semantically Rich Application-Centric Security in Android annual computer security applications conference. pp. 340- 349 ,(2009) , 10.1109/ACSAC.2009.39
Micheline Kamber, Jiawei Han, Jian Pei, Data Mining: Concepts and Techniques ,(2000)