Android Security Permissions - Can We Trust Them?
Clemens OrthackerPeter TeuflStefan KraxbergerGünther LacknerMichael GissingAlexander MarsalekJohannes LeibetsederOliver PrevenhueberPublished in: MobiSec (2011)
Keyphrases
- access control
- access control models
- trust management
- trust relationships
- policy enforcement
- role based access control
- security issues
- malware detection
- security services
- security policies
- information security
- trusted computing
- data security
- trust model
- security model
- trust negotiation
- security mechanisms
- public key infrastructure
- access control policies
- privacy concerns
- usage control
- mobile devices
- security management
- intrusion detection
- identity management
- network security
- security requirements
- database security
- statistical databases
- social networking
- multi domain
- data integrity
- security analysis
- computer security
- computing platform
- key management
- public key
- mobile applications