共 50 条
- [1] DACPCC: A Data Access Control Scheme with Access Permission for Cloud Computing Yang, Jia-Hai (yang@cernet.edu.cn), 2018, Chinese Institute of Electronics (46): : 236 - 244
- [2] Permission Token Segmentation Scheme based on Blockchain Access Control 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1956 - 1964
- [3] Towards a multilayered permission-based access control for extending Android security CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2018, 30 (05):
- [4] DroidProtector: Preventing Capability Leak of Android Applications 2017 INTERNATIONAL CONFERENCE ON GREEN INFORMATICS (ICGI), 2017, : 163 - 168
- [5] Malevolent App Pairs: An Android Permission Overpassing Scheme PROCEEDINGS OF THE ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS (CF'16), 2016, : 431 - 436
- [6] Accept - Maybe - Decline: Introducing Partial Consent for the Permission-based Access Control Model of Android SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 71 - 80
- [7] Permission-Combination-based Scheme for Android Mobile Malware Detection 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 2301 - 2306
- [9] Dude, Ask The Experts!: Android Resource Access Permission Recommendation with RecDroid PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 296 - 304