Lane, 2012 - Google Patents
Does the android permission system provide adequate information privacy protection for end-users of mobile apps?Lane, 2012
View PDF- Document ID
- 11283809994692509322
- Author
- Lane M
- Publication year
External Links
Snippet
This paper investigates the Android permission system and its adequacy in alerting end- users of potential information privacy risks in an app. When an end-user seeks to install an app, they are presented with the required permissions and make a supposedly informed …
- 230000004224 protection 0 title abstract description 18
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/72—Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
- H04M1/725—Cordless telephones
- H04M1/72519—Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/003—Mobile application execution environments for application services, e.g. communicating with application store or appstore servers in the application service network and vice versa, 3GPP SIM Application toolkit [SAT], 3GPP OSA or 3GPP MEXE
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/66—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges with means for preventing unauthorised or fraudulent calling
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9104840B1 (en) | Trusted security zone watermark | |
Wei et al. | Malicious android applications in the enterprise: What do they do and how do we fix it? | |
US9049013B2 (en) | Trusted security zone containers for the protection and confidentiality of trusted service manager data | |
Mylonas et al. | Assessing privacy risks in android: A user-centric approach | |
US11190522B2 (en) | Access delegation using offline token | |
Khatoon et al. | Android permission system and user privacy—A review of concept and approaches | |
US9876896B1 (en) | System and method of interdicting malware infiltration as spoofed advertisement | |
Oh et al. | Best security practices for android, blackberry, and iOS | |
CN107451488B (en) | Method and device for providing personal information and mobile terminal | |
Hamed et al. | Privacy risk assessment and users' awareness for mobile apps permissions | |
US20160094725A1 (en) | Enforcement of compliance rules | |
Lane | Does the android permission system provide adequate information privacy protection for end-users of mobile apps? | |
KR20160143706A (en) | Method and system for protecting and/or anonymizing a user identity and/or user data of a subscriber of a data protection service, mobile communication network, program and computer program product | |
CN105653904B (en) | Using the processing method of screen locking, device and mobile terminal | |
Kaur et al. | PeMo: Modifying application's permissions and preventing information stealing on smartphones | |
US8787879B2 (en) | Multiple SIM card secure global mobile device | |
Alotaibi et al. | A novel Taxonomy for mobile applications data | |
Kaya | Trust and security risks in mobile banking | |
HARRIS et al. | Mobile Device Security Issues Within the US Disadvantaged Business Enterprise Program. | |
US20160234219A1 (en) | User adaptive method and system for controlling mobile device | |
Hettrich | Data privacy regulation in the age of smartphones | |
Sellwood et al. | Sleeping android: Exploit through dormant permission requests | |
Levinson-Waldman | Cellphones, Law Enforcement, and the Right to Privacy | |
CN115114252B (en) | File sharing method and device | |
Sokolova et al. | Respecting user privacy in mobiles: privacy by design permission system for mobile applications |