Login / Signup
A methodology for empirical analysis of permission-based security models and its application to android.
David Barrera
Hilmi Günes Kayacik
Paul C. van Oorschot
Anil Somayaji
Published in:
CCS (2010)
Keyphrases
</>
empirical analysis
access control
theoretical analysis
security policies
mathematical models
prior knowledge
statistical models
modeling framework
security analysis
data mining
process model
computational models
historical data
data security