2021
DOI: 10.1109/jiot.2020.3039472
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Permission Optimization Framework for Privacy Enhancement of Mobile Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Qu et al proposed Permizer, an automatic permission optimization to recommend app permission configuration to users. Permizer builds a mapping between permissions and functionalities for each app then regulates the relationship between permission and functionality based on the user's privacy preferences [28]. Xiao et al proposed an approach to identify minimum required permissions for an android app.…”
Section: Related Workmentioning
confidence: 99%
“…Qu et al proposed Permizer, an automatic permission optimization to recommend app permission configuration to users. Permizer builds a mapping between permissions and functionalities for each app then regulates the relationship between permission and functionality based on the user's privacy preferences [28]. Xiao et al proposed an approach to identify minimum required permissions for an android app.…”
Section: Related Workmentioning
confidence: 99%
“…Some recent solutions, such as (Caputo et al, 2021) focused on anonymization of data to preserve the privacy of the user. In (Qu et al, 2020), authors introduce an automatic permission management model, which collectively considers the risk of the permission, functionalities of the app, and user's privacy requirement. However, none of these solutions helps users understand the Intent of the developer.…”
Section: Low-level Modificationmentioning
confidence: 99%
“…Users of mobile OSs can utilize the permission mechanism to fine-tune the available resources on a perapplication basis. In the security research community, many studies have been conducted on permission mechanisms in mobile OSs, including large-scale measurements [4], [5], [6], user perception [7], [8], [9], [10], unauthorized privilege acquisition [11], [12], and the proposals of new permission mechanisms [13], [14], [15], [16]. While mobile OS permission mechanisms have been studied by many researchers, to the best of our knowledge, no studies have systematically analyzed the permission mechanisms of web browsers.…”
Section: Introductionmentioning
confidence: 99%