Context-centric Security
暂无分享,去创建一个
Elaine Shi | Dawn Xiaodong Song | Krste Asanovic | Prashanth Mohan | Mohit Tiwari | Hilfi Alkaff | Eric Love | Andrew Osheroff
[1] Helen J. Wang,et al. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems , 2012, 2012 IEEE Symposium on Security and Privacy.
[2] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[3] David A. Wagner,et al. The Effectiveness of Application Permissions , 2011, WebApps.
[4] Frank Stajano,et al. Implementing a Multi-hat PDA , 2005, Security Protocols Workshop.
[5] Trevor Darrell,et al. Privacy in Context , 2001, Hum. Comput. Interact..
[6] E. Goffman. The Presentation of Self in Everyday Life , 1959 .
[7] P. Menage. Adding Generic Process Containers to the Linux Kernel , 2010 .
[8] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[9] Benjamin Livshits,et al. RePriv: Re-imagining Content Personalization and In-browser Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.
[10] Trent Jaeger,et al. Implicit Flows: Can't Live with 'Em, Can't Live without 'Em , 2008, ICISS.
[11] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[12] Saikat Guha,et al. Privad: Practical Privacy in Online Advertising , 2011, NSDI.
[13] Jeremy Andrus,et al. Cells: a virtual mobile smartphone architecture , 2011, SOSP '11.
[14] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[15] Heinrich Hußmann,et al. TreasurePhone: Context-Sensitive User Data Protection on Mobile Phones , 2010, Pervasive.
[16] Helen Nissenbaum,et al. Adnostic: Privacy Preserving Targeted Advertising , 2010, NDSS.
[17] Youngki Lee,et al. MobiCon: a mobile context-monitoring platform , 2012, CACM.
[18] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[19] Martin C. Brown,et al. Beos Porting UNIX Applications , 1998 .