Overview of Mobile Containerization Approaches and Open Research Directions
暂无分享,去创建一个
Elisa Bertino | Daniele Midi | Oyindamola Oluwatimi | E. Bertino | Daniele Midi | Oyindamola Oluwatimi
[1] Vyas Sekar,et al. Measuring user confidence in smartphone security and privacy , 2012, SOUPS.
[2] C. Gehrmann. Mobile Platform Security , 2006 .
[3] N. Asokan,et al. Security of OS-Level Virtualization Technologies , 2014, NordSec.
[4] Lujo Bauer,et al. More than skin deep: measuring effects of the underlying model on access-control system usability , 2011, CHI.
[5] Jeremy Andrus,et al. Cells: a virtual mobile smartphone architecture , 2011, SOSP '11.
[6] Elisa Bertino,et al. IdentiDroid: Android can finally Wear its Anonymous Suit , 2014, Trans. Data Priv..
[7] Nicolas Christin,et al. All Your Droid Are Belong to Us: A Survey of Current Android Attacks , 2011, WOOT.
[8] Elisa Bertino,et al. Adaptive data protection in distributed systems , 2013, CODASPY.
[9] Yuval Elovici,et al. Securing Android-Powered Mobile Devices Using SELinux , 2010, IEEE Security & Privacy.
[10] Mauro Conti,et al. CRePE: Context-Related Policy Enforcement for Android , 2010, ISC.
[11] Ahmad-Reza Sadeghi,et al. Privilege Escalation Attacks on Android , 2010, ISC.
[12] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[13] Steven Furnell,et al. The challenges of understanding and using security: A survey of end-users , 2006, Comput. Secur..
[14] Clare-Marie Karat,et al. Usable security and privacy: a case study of developing privacy management tools , 2005, SOUPS '05.
[15] Neal Leavitt. Today's Mobile Security Requires a New Approach , 2013, Computer.
[16] Slim Trabelsi,et al. Sticky policies for mobile devices , 2013, SACMAT '13.
[17] David W. Chadwick,et al. Enforcing "sticky" security policies throughout a distributed application , 2008, MidSec '08.
[18] Bill Morrow,et al. BYOD security challenges: control and protect your most sensitive data , 2012, Netw. Secur..
[19] Elisa Bertino,et al. Context-Based Access Control Systems for Mobile Devices , 2015, IEEE Transactions on Dependable and Secure Computing.
[20] Claudia Eckert,et al. Improving mobile device security with operating system-level virtualization , 2015, Comput. Secur..
[21] Hormazd Romer,et al. Best practices for BYOD security , 2014 .
[22] Lujo Bauer,et al. User-Controllable Security and Privacy for Pervasive Computing , 2007, Eighth IEEE Workshop on Mobile Computing Systems and Applications.
[23] Alexander Varshavsky,et al. Enabling Secure and Spontaneous Communication between Mobile Devices using Common Radio Environment , 2007 .