2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2012
DOI: 10.1109/icsmc.2012.6377944
|View full text |Cite
|
Sign up to set email alerts
|

PUPDroid - Personalized user privacy mechanism for android

Abstract: The technological progress of mobile devices, the low cost of this device and the facility of use are increasing the usability of mobile devices. Since these devices provide access to network, its owner has access to almost limitless amount of data and can store more information than in his personal computer (like phone call record, list of contact and calendar). A point of attention is that these devices have some resources that, if misused, can be dangerous to the owner. The major number of existing mobile d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…All applications wishing to share a UID must be signed by the same developer key, and these share access to the same protected data files, as private data files created by the application are owned by the UID of the application, which is in this case shared between a group of applications. [9] One additional feature of the shared UID facility on Android is the ability for permissions to be shared between different packages using the same UID. [8] In this manner, it is possible for an application with no permissions, which shares a UID with a privileged application, to make use of these privileged permissions, without itself requesting these permissions.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…All applications wishing to share a UID must be signed by the same developer key, and these share access to the same protected data files, as private data files created by the application are owned by the UID of the application, which is in this case shared between a group of applications. [9] One additional feature of the shared UID facility on Android is the ability for permissions to be shared between different packages using the same UID. [8] In this manner, it is possible for an application with no permissions, which shares a UID with a privileged application, to make use of these privileged permissions, without itself requesting these permissions.…”
Section: Methodsmentioning
confidence: 99%
“…A similar approach was proposed by Melo and Zorzo in [9], where users are able to control and personalise their own settings for privacy, after installation, using their PUPDroid framework. As with the MockDroid proposal, this technique requires modifications to be made to the Android operating system, in order to enforce the user's selections.…”
Section: Run-time Granulatitymentioning
confidence: 99%
“…To address this problem, many fine-grained solutions have been proposed for users to communicate their privacy preferences to the service provider (e.g. [2,15,16,31,42,49,75,80,85,119]). In fact, there is evidence that when given a choice, users prefer to exercise fine-grained control and select the data they are happy to share, rather than refuse to share any data at all.…”
Section: Privacy Managementmentioning
confidence: 99%