A Conundrum of Permissions: Installing Applications on an Android Smartphone.
Patrick Gage KelleySunny ConsolvoLorrie Faith CranorJaeyeon JungNorman M. SadehDavid WetherallPublished in: Financial Cryptography Workshops (2012)
Keyphrases
- android application
- mobile devices
- mobile applications
- android platform
- access control
- fully functional
- smart phones
- mobile platforms
- hardware and software
- context aware
- mobile phone
- mobile apps
- mobile learning
- security model
- malware detection
- stream processing
- mobile platform
- role based access control
- artificial intelligence
- byte code
- artificial neural networks
- distributed systems
- wifi
- learning algorithm
- database applications
- daily life
- social networking