Browsing Department of Informatics by Subject "security management"
Now showing items 1-1 of 1
-
Inferring Required Permissions for Statically Composed Programs
(Lecture Notes in Computer Science; 8208, Chapter; Peer reviewed, 2013)Permission-based security models are common in smartphone operating systems. Such models implement access control for sensitive APIs, introducing an additional concern for application developers. It is important for the ...