X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Conference Proceeding (6901) 6901
Journal Article (2727) 2727
Newspaper Article (563) 563
Publication (211) 211
Magazine Article (156) 156
Trade Publication Article (138) 138
Book Chapter (95) 95
Dissertation (78) 78
Web Resource (26) 26
Book Review (16) 16
Book / eBook (15) 15
Government Document (12) 12
Standard (4) 4
Data Set (3) 3
Paper (2) 2
Newsletter (1) 1
Reference (1) 1
Transcript (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
permission (8098) 8098
computer science (1229) 1229
access control (1156) 1156
permission marketing (787) 787
hardware (724) 724
costs (702) 702
delay (660) 660
application software (633) 633
algorithm design and analysis (593) 593
engineering, electrical & electronic (555) 555
security (512) 512
distributed computing (503) 503
computer architecture (492) 492
authorization (489) 489
laboratories (452) 452
information security (447) 447
energy consumption (439) 439
timing (434) 434
protection (424) 424
computational modeling (422) 422
humans (416) 416
circuits (380) 380
clocks (347) 347
design automation (347) 347
logic (344) 344
testing (342) 342
very large scale integration (321) 321
protocols (317) 317
control systems (315) 315
circuit simulation (309) 309
privacy (306) 306
analysis (302) 302
internet (298) 298
data security (285) 285
computer networks (284) 284
routing (281) 281
algorithms (279) 279
libraries (279) 279
educational institutions (278) 278
performance analysis (269) 269
runtime (262) 262
microprocessors (255) 255
process design (253) 253
software engineering (253) 253
design engineering (249) 249
resource management (249) 249
authentication (233) 233
integrated circuit interconnections (233) 233
design optimization (231) 231
databases (229) 229
usage (229) 229
embedded system (226) 226
design methodology (224) 224
permissions (224) 224
spamming (224) 224
bandwidth (222) 222
logic design (222) 222
studies (222) 222
circuit testing (219) 219
operating systems (219) 219
data structures (218) 218
voltage (218) 218
frequency (215) 215
java (215) 215
processor scheduling (211) 211
telecommunications (211) 211
android (210) 210
switches (209) 209
circuit synthesis (208) 208
design (208) 208
analytical models (204) 204
collaboration (202) 202
computer security (199) 199
software systems (199) 199
concurrent computing (198) 198
planning permission (196) 196
history (190) 190
machinery (189) 189
throughput (186) 186
access protocols (185) 185
contracts (183) 183
prototypes (182) 182
robustness (180) 180
registers (177) 177
information systems (176) 176
system testing (165) 165
monitoring (161) 161
cryptography (158) 158
field programmable gate arrays (158) 158
large-scale systems (158) 158
computer simulation (153) 153
data mining (153) 153
power dissipation (152) 152
equations (151) 151
boolean functions (150) 150
programming (150) 150
context modeling (149) 149
performance (148) 148
cmos technology (147) 147
parallel processing (147) 147
more...
Library Location Library Location
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (10128) 10128
Korean (97) 97
Chinese (74) 74
Japanese (68) 68
German (28) 28
French (12) 12
Russian (12) 12
Turkish (7) 7
Swedish (5) 5
Persian (4) 4
Portuguese (4) 4
Spanish (4) 4
Indonesian (3) 3
Croatian (2) 2
Czech (2) 2
Lithuanian (2) 2
Afrikaans (1) 1
Arabic (1) 1
Italian (1) 1
Romanian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Proceedings of the 18th ACM conference on computer and communications security, ISSN 1543-7221, 10/2011, pp. 627 - 638
Android provides third-party applications with an extensive API that includes access to phone hardware, settings, and user data. Access to privacy- and... 
least privilege | permissions | android | Permissions | Least privilege | Android
Conference Proceeding
Proceedings of the 2012 ACM conference on computer and communications security, ISSN 1543-7221, 10/2012, pp. 217 - 228
Modern smartphone operating systems (OSs) have been developed with a greater emphasis on security and protecting privacy. One of the mechanisms these systems... 
permissions | smartphone | android | Permissions | Smartphone | Android
Conference Proceeding
Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, ISSN 1000-6788, 07/2017, Volume 37, Issue 7, pp. 1752 - 1760
Journal Article
Jisuanji Xuebao/Chinese Journal of Computers, ISSN 0254-4164, 06/2018, Volume 41, Issue 6, pp. 1189 - 1206
Journal Article
Computers & Security, ISSN 0167-4048, 06/2014, Volume 43, pp. 205 - 218
Journal Article
03/2013
Modern smartphone operating systems (OSs) have been developed with a greater emphasis on security and protecting privacy. One of the security mechanisms these... 
0984 | Permissions | Smartphone | Android
Dissertation
Future Generation Computer Systems, ISSN 0167-739X, 07/2014, Volume 36, pp. 122 - 132
An application uses a permission system to regulate the access to system resources and users’ privacy-relevant information. Existing works have demonstrated... 
Android permission | Contrast mining | Biclustering | Data mining | Permission pattern | MALWARE | COMPUTER SCIENCE, THEORY & METHODS | Spyware | Algorithms | Mobile applications
Journal Article
Transactions on Emerging Telecommunications Technologies, ISSN 2161-3915, 05/2016, Volume 27, Issue 5, pp. 675 - 684
With the popularity of Android devices, mobile malware in Android has became more prevalent. Malware causes lots of harm to users, such as stealing personal... 
PERMISSION | TELECOMMUNICATIONS
Journal Article
IEEE Transactions on Software Engineering, ISSN 0098-5589, 9/2019, pp. 1 - 1
The Android OS market is experiencing a growing share globally. It is becoming the mobile platform of choice for an increasing number of users. People rely on... 
Trustability | Static Analysis | Android Permissions
Journal Article
Cluster Computing, ISSN 1386-7857, 11/2019, Volume 22, Issue S6, pp. 13337 - 13350
Journal Article
Proceedings of the 4th ACM Workshop on security and privacy in smartphones & mobile devices, ISSN 1543-7221, 11/2014, Volume 2014-, Issue November, pp. 63 - 74
Previous research about sensor based attacks on Android platform focused mainly on accessing or controlling over sensitive components, such as camera,... 
permission bypassing | voice assistant | android security | speaker | zero permission attack | Android security | Voice assistant | Permission bypassing | Zero permission attack | Speaker
Conference Proceeding
Ruan Jian Xue Bao/Journal of Software, ISSN 1000-9825, 12/2015, Volume 26, pp. 263 - 271
Journal Article
Review of Symbolic Logic, ISSN 1755-0203, 12/2018, Volume 11, Issue 4, pp. 736 - 779
Journal Article
Future Generation Computer Systems, ISSN 0167-739X, 11/2018, Volume 88, pp. 707 - 717
The (UAQ) Problem is a key issue related to efficient handling of users’ access requests in (RBAC) systems. However, there may not exist any solution to a... 
Role–permission reassignment | User authorization query | Computational complexity | Role based access control | SAT problem | Role-permission reassignment | COMPLEXITY | COMPUTER SCIENCE, THEORY & METHODS | PROPAGATION | Computer science | Analysis
Journal Article
Journal Article
Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, ISSN 1543-7221, 11/2013, pp. 611 - 622
Android platform adopts permissions to protect sensitive resources from untrusted apps. However, after permissions are granted by users at install time, apps... 
vetting undesirable behaviors | permission use analysis | android behavior representation | android security
Conference Proceeding
Jisuanji Xuebao/Chinese Journal of Computers, ISSN 0254-4164, 07/2017, Volume 40, Issue 7, pp. 1680 - 1698
Journal Article
by Xu, GS and Xu, SW and Gao, C and Wang, B and Xu, GA
APPLIED SCIENCES-BASEL, ISSN 2076-3417, 09/2019, Volume 9, Issue 18, p. 3699
Permission-related issues in Android apps have been widely studied in our research community, while most of the previous studies considered these issues from... 
app developer | PHYSICS, APPLIED | permission overprivilege | MATERIALS SCIENCE, MULTIDISCIPLINARY | permission | CHEMISTRY, MULTIDISCIPLINARY | mobile app
Journal Article
Information Sciences, ISSN 0020-0255, 04/2019, Volume 480, pp. 55 - 69
Group key agreement is one of the key technologies for ensuring information exchange security among group members. Due to different sensitivities of the... 
Permission level | Asymmetric group key agreement | Attribute-based sharing permissions | Information exchange | SCHEME | PROTECTION | COMPUTER SCIENCE, INFORMATION SYSTEMS | DATA-SECURITY | EFFICIENT
Journal Article
2003, PLANNING, HISTORY AND THE ENVIRONMENT SERIES, ISBN 0419244107, 204
The British system of universal development control celebrated its 50th anniversary in 1997. Remarkably, the system has survived more or less intact but the... 
Regional planning | City planning | City planning and redevelopment law | Land use
Book
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.