共 50 条
- [21] The performance of system handover scheme with permission probability control CCNC 2004: 1ST IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, PROCEEDINGS: CONSUMER NETWORKING: CLOSING THE DIGITAL DIVIDE, 2004, : 116 - 121
- [22] Risky Permission Set Based Access Control Constraint 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND TECHNOLOGY (ICCST 2015), 2015, : 510 - 517
- [24] A Cost Effective Scheme for Content Verification and Access Control of Quality of an Image IEEE REGION 10 COLLOQUIUM AND THIRD INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS, VOLS 1 AND 2, 2008, : 478 - +
- [26] Access Control Framework for Android System PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 209 - 212
- [27] Analysis of Access Control Enforcement in Android SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 117 - 118
- [28] Mandatory Access Control for Android Application 2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 299 - 300
- [29] Analysis of access control enforcement in android Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT, 2020, : 117 - 118