No surprises: measuring intrusiveness of smartphone applications by detecting objective context deviations
暂无分享,去创建一个
[1] Yvonne Rogers,et al. From spaces to places: emerging contexts in mobile privacy , 2009, UbiComp.
[2] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[3] Paul M. Schwartz,et al. The PII Problem: Privacy and a New Concept of Personally Identifiable Information , 2011 .
[4] J. Foster,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[5] A. Anonymous,et al. Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy , 2013, J. Priv. Confidentiality.
[6] Vyas Sekar,et al. Measuring user confidence in smartphone security and privacy , 2012, SOUPS.
[7] R. Gavison. Privacy and the Limits of Law , 1980 .
[8] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[9] Ting Yu,et al. An identifiability-based access control model for privacy protection in open systems , 2004, WPES '04.
[10] Avik Chaudhuri,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[11] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[12] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[13] Lorrie Faith Cranor,et al. A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.
[14] Jennifer King. How Come I'm Allowing Strangers to Go Through My Phone? Smartphones and Privacy Expectations. , 2012 .