[go: up one dir, main page]

Ramachandran et al., 2017 - Google Patents

Understanding and granting android permissions: A user survey

Ramachandran et al., 2017

View PDF
Document ID
13240021945230220989
Author
Ramachandran S
Dimitri A
Galinium M
Tahir M
Ananth I
Schunck C
Talamo M
Publication year
Publication venue
2017 International Carnahan Conference on Security Technology (ICCST)

External Links

Snippet

Whenever users install a new application on their smart devices with an Android KitKat or Lollipop operating system they are asked to grant the application (app) provider access to features of the device, ranging from data storage to device location and from device identity …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/72Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
    • H04M1/725Cordless telephones
    • H04M1/72519Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
    • H04M1/72563Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status with means for adapting by the user the functionality or the communication capability of the terminal under specific circumstances
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce

Similar Documents

Publication Publication Date Title
Li et al. How developers talk about personal data and what it means for user privacy: A case study of a developer forum on reddit
Felt et al. I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns
Barth et al. Understanding online privacy—a systematic review of privacy visualizations and privacy by design guidelines
Nguyen et al. Short text, large effect: Measuring the impact of user reviews on android app security & privacy
Shen et al. Can systems explain permissions better? understanding users' misperceptions under smartphone runtime permission model
Zimmeck et al. PrivacyFlash Pro: Automating Privacy Policy Generation for Mobile Apps.
Xu et al. Measuring mobile users' concerns for information privacy
Egelman et al. Choice architecture and smartphone privacy: There’sa price for that
Ismail et al. Crowdsourced exploration of security configurations
Abu-Shanab et al. Adoption of mobile commerce technology: an involvement of trust and risk concerns
US9824210B2 (en) Method for measuring and monitoring the access levels to personal data generated by resources of a user device
Kowalczyk et al. Understanding dark patterns in home IoT devices
Jorgensen et al. Dimensions of risk in mobile applications: A user study
Reinfelder et al. Differences between Android and iPhone users in their security and privacy awareness
Ramachandran et al. Understanding and granting android permissions: A user survey
Gold et al. A validity study of self-reported daily texting frequency, cell phone characteristics, and texting styles among young adults
Degirmenci et al. Mobile applications and access to personal information: A discussion of users' privacy concerns
Balebako et al. Is your inseam a biometric? a case study on the role of usability studies in developing public policy
Keith et al. Privacy assurance and network effects in the adoption of location-based services: An iPhone experiment
Kang et al. Visualizing privacy risks of mobile applications through a privacy meter
Birrell et al. SoK: Technical implementation and human impact of internet privacy regulations
Schessler et al. Replication: Measuring user perceptions in smartphone security and privacy in Germany
Zhou et al. Users’ perceived control, trust and expectation on privacy settings of smartphone
Zhou et al. User attitudes and behaviors toward personalized control of privacy settings on smartphones
Kojima et al. Are Dark Patterns Self-destructive for Service Providers?: Revealing Their Impacts on Usability and User Satisfaction