参考文献
|
-
Naver corporation, http://www.navercorp.com/en/index.nhn
-
Facebook Corporation, https://www.facebook.com/facebook
-
Bi, C.(2009).Research and Application of SQLite Embedded Database Technology.WSEAS Transactions on Computers,8(1),539-543.
-
Biswas, D.,Aad, I.,Perrucci, G. P.(2013).Privacy Panel: Usable and Quantifiable Mobile Privacy.Proc. of the 8th International Conference on Availability, Reliability and Security
-
Chen, D.,Han, X.,Wang, W.(2010).Use of SQLite on Embedded System.Proc. of the 2010 International Conference on Intelligent Computing and Cognitive Informatics
-
Enck, W.,Gilbert, P.,Chun, B. G.,Cox, L. P.,Jung, J.,McDaniel, P.,Sheth, A. N.(2010).TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones.Proc. of the 9th USENIX conference on Operating systems design and implementation
-
Frank, M.,Dong, B.,Porter-Felt, A.,Song, D.(2012).Mining Permission Request Patterns from Android and Facebook Applications.Proc. of the 2012 IEEE International Conference on Data Mining
-
Gibler, C.,Crussell, J.,Erickson, J.,Chen, H.(2012).AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale.Proc. of the 5th international conference on Trust and Trustworthy Computing
-
Grace, M.,Zhou, Y.,Zhang, Q.,Zou, S.,Jiang, X.(2012).RiskRanker: scalable and accurate zero-day android malware detection.Proc. of the 10th international conference on Mobile systems, applications, and services
-
Kuzuno, H.,Tonami., S.(2013).Signature Generation for Sensitive Information Leakage in Android Applications.Proc. of the 29th IEEE International Conference on Data Engineering Workshops
-
Landman, M.(2010).Managing Smart Phone Security Risks.Proc. of the 2010 Information Security Curriculum Development Conference
-
Lv, J.,Xu, S.,Li, Y.(2009).Application Research of Embedded Database SQLite.Proc.of the 2009 International Forum on Information Technology and Applications
-
Manning, C. D.,Raghavan, Pr.,Schtze, H.(2008).Introduction to information retrieval.NY, USA:Cambridge University Press.
-
Mutawa, N. A.,Baggili, I.,Marrington, A.(2012).Forensic analysis of social networking applications on mobile devices.Proc. of the 12th Annual Digital Forensics Research Conference
-
Portokalidis, G.,Homburg, P.,Anagnostakis, K.,Bos, H.(2010).Paranoid Android:versatile protection for smartphones.Proc. of the 26th Annual Computer Security Applications Conference
-
Rosen, S.,Qian, Z.,Mao, Z. M.(2013).AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users.Proc. of the 3rd ACM conference on Data and application security and privacy
-
Samarati, P.(2001).Protecting respondents' identities in microdata release.IEEE Transactions on Knowledge and Data Engineering,13(6),1010-1027.
-
Samarati, P.,Sweeney, L.(1998).Generalizing data to provide anonymity when disclosing information.Proc. of the 7th ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
-
Sweeney, L.(2002).Achieving k-anonymity privacy protection using generalization and suppression.International Journal of Uncertainty, Fuzziness, and Knowledge-Base Systems,10(5),571-588.
-
Ulltveit-Moe, N,Gjøsæter, T,Assev, S. M.,Køien, G. M.,Oleshchuk, V.(2013).Privacy Handling for Critical Information Infrastructures.Proc. of the IEEE International Conference on Industrial Informatics
-
Whang, S. E.,Garcia-Molina, H.(2012).A model for quantifying information leakage.Lecture Notes in Computer Science,7482,25-44.
-
Yang, Z.,Yang, M.,Zhang, Y.,Gu, G.,Ning, P.,Wang, X. S.(2013).AppIntent: analyzing sensitive data transmission in android for privacy leakage detection.Proc. of the 2013 ACM SIGSAC conference on Computer & communications security
-
Zheng, C.,Zhu, S.,Dai, S.,Gu, G.,Gong, X.,Han, X.,Zou, W.(2012).SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications.Proc. Of the 2nd ACM workshop on Security and privacy in smartphones and mobile devices
|