AppGuard - Fine-Grained Policy Enforcement for Untrusted Android Applications (Englisch)
- Neue Suche nach: Backes, Michael
- Neue Suche nach: Gerling, Sebastian
- Neue Suche nach: Hammer, Christian
- Neue Suche nach: Maffei, Matteo
- Neue Suche nach: Styp-Rekowsky, Philipp
- Neue Suche nach: Backes, Michael
- Neue Suche nach: Gerling, Sebastian
- Neue Suche nach: Hammer, Christian
- Neue Suche nach: Maffei, Matteo
- Neue Suche nach: Styp-Rekowsky, Philipp
In:
DPM, International Workshop on Data Privacy Management, 8, SETOP, International Workshop on Autonomous and Spontaneous Security, 6
;
213-231
;
2014
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:AppGuard - Fine-Grained Policy Enforcement for Untrusted Android Applications
-
Beteiligte:Backes, Michael ( Autor:in ) / Gerling, Sebastian ( Autor:in ) / Hammer, Christian ( Autor:in ) / Maffei, Matteo ( Autor:in ) / Styp-Rekowsky, Philipp ( Autor:in )
-
Erschienen in:Lecture Notes in Computer Science ; 8247 ; 213-231
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:2014
-
Format / Umfang:19 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Quantifying and Measuring AnonymityMurdoch, S.J. et al. | 2014
- 17
-
Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-PhonesHajny, J. / Malina, L. / Martinasek, Z. / Tethal, O. et al. | 2014
- 34
-
Practical Packing Method in Somewhat Homomorphic EncryptionYasuda, M. / Shimoyama, T. / Kogure, J. / Yokoyama, K. / Koshiba, T. et al. | 2014
- 51
-
Collaborative and Privacy-Aware Sensing for Observing Urban Movement PatternsGoncalves, N. / Jose, R. / Baquero, C. et al. | 2014
- 66
-
Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest SettingBarni, M. / Bernaschi, M. / Lazzeretti, R. / Pignata, T. / Sabellico, A. et al. | 2014
- 83
-
Privacy Analysis of a Hidden Friendship ProtocolKammuller, F. / Preibusch, S. et al. | 2014
- 100
-
Anonymous and Transferable Electronic Ticketing SchemeVives-Guasch, A. / Payeras-Capella, M.M. / Mut-Puigserver, M. / Castella-Roca, J. / Ferrer-Gomila, J.-L. et al. | 2014
- 114
-
Privacy-Preserving Publish/Subscribe: Efficient Protocols in a Distributed ModelDi Crescenzo, G. / Coan, B. / Schultz, J. / Tsang, S. / Wright, R.N. et al. | 2014
- 133
-
Privacy-Preserving Processing of Raw Genomic DataAyday, E. / Raisaro, J.L. / Hengartner, U. / Molyneaux, A. / Hubaux, J.-P. et al. | 2014
- 148
-
Using Search Results to Microaggregate Query Logs SemanticallyErola, A. / Castella-Roca, J. et al. | 2014
- 162
-
Legal Issues About Metadata Data Privacy vs Information SecurityMunier, M. / Lalanne, V. / Ardoy, P.-Y. / Ricarde, M. et al. | 2014
- 178
-
Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious ModelNeugebauer, G. / Brutschy, L. / Meyer, U. / Wetzel, S. et al. | 2014
- 194
-
Differentially Private Smart Metering with Battery RechargingBackes, M. / Meiser, S. et al. | 2014
- 213
-
AppGuard - Fine-Grained Policy Enforcement for Untrusted Android ApplicationsBackes, M. / Gerling, S. / Hammer, C. / Maffei, M. / von Styp-Rekowsky, P. et al. | 2014
- 235
-
Reference Monitors for Security and Interoperability in OAuth 2.0Cherrueau, R.-A. / Douence, R. / Royer, J.-C. / Sudholt, M. / de Oliveira, A.S. / Roudier, Y. / Dell Amico, M. et al. | 2014
- 250
-
Remote Biometrics for Robust Persistent AuthenticationIngwar, M.I. / Jensen, C.D. et al. | 2014
- 268
-
Classifying Android Malware through Subgraph MiningMartinelli, F. / Saracino, A. / Sgandurra, D. et al. | 2014
- 284
-
Introducing Probabilities in Contract-Based Approaches for Mobile Application SecurityDini, G. / Martinelli, F. / Matteucci, I. / Saracino, A. / Sgandurra, D. et al. | 2014
- 300
-
Advanced Detection Tool for PDF ThreatsJerome, Q. / Marchal, S. / State, R. / Engel, T. et al. | 2014
- 316
-
Enforcing Input Validation through Aspect Oriented ProgrammingSerme, G. / Scholte, T. / de Oliveira, A.S. et al. | 2014
- 333
-
Lightweight Cryptography for Embedded Systems - A Comparative AnalysisManifavas, C. / Hatzivasilis, G. / Fysarakis, K. / Rantos, K. et al. | 2014
- 353
-
A Simulation of Document Detection Methods and Reducing False Positives for Private Stream SearchingOehler, M. / Phatak, D.S. et al. | 2014
- 362
-
Dynamic Anonymous Index for Confidential DataNavarro-Arribas, G. / Abril, D. / Torra, V. et al. | 2014
- 369
-
Are On-Line Personae Really Unlinkable?Veeningen, M. / Piepoli, A. / Zannone, N. et al. | 2014
- 380
-
On the Privacy of Private Browsing - A Forensic ApproachSatvat, K. / Forshaw, M. / Hao, F. / Toreini, E. et al. | 2014
- 390
-
Privacy-Preserving Trust Management Mechanisms from Private Matching SchemesFarras, O. / Domingo-Ferrer, J. / Blanco-Justicia, A. et al. | 2014