Reconciling mobile app privacy and usability on smartphones: could user privacy profiles help?
暂无分享,去创建一个
Norman M. Sadeh | Bin Liu | Jialiu Lin | N. Sadeh | Bin Liu | Jialiu Lin
[1] David A. Wagner,et al. I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns , 2012, SPSM '12.
[2] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[3] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[4] Lothar Reichel,et al. Augmented Implicitly Restarted Lanczos Bidiagonalization Methods , 2005, SIAM J. Sci. Comput..
[5] Norman M. Sadeh,et al. User-Controllable Learning of Location Privacy Policies With Gaussian Mixture Models , 2011, AAAI.
[6] Norman M. Sadeh,et al. Modeling people's place naming preferences in location sharing , 2010, UbiComp.
[7] Seungyeop Han,et al. Short paper: enhancing mobile application permissions with runtime feedback and constraints , 2012, SPSM '12.
[8] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[9] Chia-Hua Ho,et al. Recent Advances of Large-Scale Linear Classification , 2012, Proceedings of the IEEE.
[10] Lorrie Faith Cranor,et al. Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs , 2011, Personal and Ubiquitous Computing.
[11] Dawn Xiaodong Song,et al. Mining Permission Request Patterns from Android and Facebook Applications , 2012, 2012 IEEE 12th International Conference on Data Mining.
[12] Yajin Zhou,et al. Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.
[13] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[14] Malcolm Hall,et al. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing , 2013, MobiSys '13.
[15] Vyas Sekar,et al. Measuring user confidence in smartphone security and privacy , 2012, SOUPS.
[16] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[17] Norman Sadeh,et al. Understandable Learning of Privacy Preferences Through Default Personas and Suggestions , 2011 .
[18] Lothar Reichel,et al. An implicitly restarted block Lanczos bidiagonalization method using Leja shifts , 2012 .
[19] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[20] Lorrie Faith Cranor,et al. Understanding and capturing people’s privacy policies in a mobile social networking application , 2009, Personal and Ubiquitous Computing.
[21] Alastair R. Beresford,et al. MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.
[22] Chih-Jen Lin,et al. LIBLINEAR: A Library for Large Linear Classification , 2008, J. Mach. Learn. Res..
[23] Lorrie Faith Cranor,et al. User-controllable learning of security and privacy policies , 2008, AISec '08.
[24] Lorrie Faith Cranor,et al. Privacy manipulation and acclimation in a location sharing application , 2013, UbiComp.
[25] Dan S. Wallach,et al. Longitudinal Analysis of Android Ad Library Permissions , 2013, ArXiv.
[26] Lorrie Faith Cranor,et al. A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.
[27] Kristen LeFevre,et al. Privacy wizards for social networking sites , 2010, WWW '10.