Policy-based security assessment of mobile end-user devices an alternative to mobile device management solutions for Android smartphones
暂无分享,去创建一个
[1] Patrick D. McDaniel,et al. Understanding Android Security , 2009, IEEE Security & Privacy Magazine.
[2] Teng Lv,et al. A Web Security Solution based on XML Technology , 2006, 2006 International Conference on Communication Technology.
[3] Yu Chen,et al. Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices , 2010, 2010 18th Euromicro Conference on Parallel, Distributed and Network-based Processing.
[4] Yuval Elovici,et al. Google Android: A State-of-the-Art Review of Security Mechanisms , 2009, ArXiv.
[5] Hidehiko Tanaka,et al. Policy Description Language for Dynamic Access Control Models , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[6] Han Bing. Analysis and Research of System Security Based on Android , 2012, 2012 Fifth International Conference on Intelligent Computation Technology and Automation.
[7] Paul Pocatilu. Android Applications Security , 2011 .
[8] Yu Chen,et al. Self-Encryption Scheme for Data Security in Mobile Devices , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[9] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[10] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[11] Yuval Elovici,et al. Securing Android-Powered Mobile Devices Using SELinux , 2010, IEEE Security & Privacy.
[12] Wang Cong,et al. A Modified AES Algorithm for the Platform of Smartphone , 2010, 2010 International Conference on Computational Aspects of Social Networks.
[13] Jiaming He,et al. Extending Android Security Enforcement with a Security Distance Model , 2011, 2011 International Conference on Internet Technology and Applications.
[14] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.