Proceedings of the 12th Workshop on Mobile Computing Systems and Applications 2011
DOI: 10.1145/2184489.2184500
|View full text |Cite
|
Sign up to set email alerts
|

MockDroid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 286 publications
(27 citation statements)
references
References 1 publication
0
27
0
Order By: Relevance
“…Although their scheme can ensure data security, data utility is decreased. The existing location data privacy protection methods [4,32] are mainly classified to three categories: the heuristic privacy-measure methods, the probability-based privacy inference methods and the privacy information retrieval methods. The heuristic privacy-measure methods are mainly to provide the privacy protection measure for some no-high required users, such as k-anonymity [19], t-closing [3], m-invariability [27] and l-diversity [25].…”
Section: Related Workmentioning
confidence: 99%
“…Although their scheme can ensure data security, data utility is decreased. The existing location data privacy protection methods [4,32] are mainly classified to three categories: the heuristic privacy-measure methods, the probability-based privacy inference methods and the privacy information retrieval methods. The heuristic privacy-measure methods are mainly to provide the privacy protection measure for some no-high required users, such as k-anonymity [19], t-closing [3], m-invariability [27] and l-diversity [25].…”
Section: Related Workmentioning
confidence: 99%
“…Another approach to extending the Android system involves allowing users to formulate policies for the access control of each app [67]. MockDroid is the most well-known system exemplifying this approach.…”
Section: Enhancing System Securitymentioning
confidence: 99%
“…The platform they propose requires the device to be rooted and allows the user to choose between three different settings where settings can be changed at a later time dynamically. Beresford et al [28] proposed MockDroid where a user could mock an application's access to a resource and allow the user to determine if the application could function without having access to a particular resource. They rely on the idea that an application has to be resilient enough to where if access to a resource is not available, that the application could still function.…”
Section: Related Workmentioning
confidence: 99%