共 50 条
[31]
A Framework for Security Policy Derivation
[J].
PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS,
2016, 81
:1899-1903
[32]
Security Enforcement by Rewriting: An Algebraic Approach
[J].
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015),
2016, 9482
:311-321
[33]
Formal and efficient enforcement of security policies
[J].
FCS '05: Proceedings of the 2005 International Conference on Foundations of Computer Science,
2005,
:143-149
[35]
Investigating Weaknesses in Android Certificate Security
[J].
MODELING AND SIMULATION FOR DEFENSE SYSTEMS AND APPLICATIONS X,
2015, 9478
[37]
Security-enhanced Android for an enterprise
[J].
International Journal of Security and Networks,
2022, 17 (02)
:92-106
[38]
A Security Configuration Assessment for Android Devices
[J].
30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II,
2015,
:2299-2304
[39]
Android Security: Permission Based Attacks
[J].
PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT,
2016,
:2754-2759
[40]
Network Security Challenges in Android Applications
[J].
PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015,
2015,
:327-332