Ramachandran et al., 2017 - Google Patents
Understanding and granting android permissions: A user surveyRamachandran et al., 2017
View PDF- Document ID
- 13240021945230220989
- Author
- Ramachandran S
- Dimitri A
- Galinium M
- Tahir M
- Ananth I
- Schunck C
- Talamo M
- Publication year
- Publication venue
- 2017 International Carnahan Conference on Security Technology (ICCST)
External Links
Snippet
Whenever users install a new application on their smart devices with an Android KitKat or Lollipop operating system they are asked to grant the application (app) provider access to features of the device, ranging from data storage to device location and from device identity …
- 238000009434 installation 0 abstract description 31
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/72—Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
- H04M1/725—Cordless telephones
- H04M1/72519—Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
- H04M1/72563—Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status with means for adapting by the user the functionality or the communication capability of the terminal under specific circumstances
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | How developers talk about personal data and what it means for user privacy: A case study of a developer forum on reddit | |
Felt et al. | I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns | |
Barth et al. | Understanding online privacy—a systematic review of privacy visualizations and privacy by design guidelines | |
Nguyen et al. | Short text, large effect: Measuring the impact of user reviews on android app security & privacy | |
Shen et al. | Can systems explain permissions better? understanding users' misperceptions under smartphone runtime permission model | |
Zimmeck et al. | PrivacyFlash Pro: Automating Privacy Policy Generation for Mobile Apps. | |
Xu et al. | Measuring mobile users' concerns for information privacy | |
Egelman et al. | Choice architecture and smartphone privacy: There’sa price for that | |
Ismail et al. | Crowdsourced exploration of security configurations | |
Abu-Shanab et al. | Adoption of mobile commerce technology: an involvement of trust and risk concerns | |
US9824210B2 (en) | Method for measuring and monitoring the access levels to personal data generated by resources of a user device | |
Kowalczyk et al. | Understanding dark patterns in home IoT devices | |
Jorgensen et al. | Dimensions of risk in mobile applications: A user study | |
Reinfelder et al. | Differences between Android and iPhone users in their security and privacy awareness | |
Ramachandran et al. | Understanding and granting android permissions: A user survey | |
Gold et al. | A validity study of self-reported daily texting frequency, cell phone characteristics, and texting styles among young adults | |
Degirmenci et al. | Mobile applications and access to personal information: A discussion of users' privacy concerns | |
Balebako et al. | Is your inseam a biometric? a case study on the role of usability studies in developing public policy | |
Keith et al. | Privacy assurance and network effects in the adoption of location-based services: An iPhone experiment | |
Kang et al. | Visualizing privacy risks of mobile applications through a privacy meter | |
Birrell et al. | SoK: Technical implementation and human impact of internet privacy regulations | |
Schessler et al. | Replication: Measuring user perceptions in smartphone security and privacy in Germany | |
Zhou et al. | Users’ perceived control, trust and expectation on privacy settings of smartphone | |
Zhou et al. | User attitudes and behaviors toward personalized control of privacy settings on smartphones | |
Kojima et al. | Are Dark Patterns Self-destructive for Service Providers?: Revealing Their Impacts on Usability and User Satisfaction |