SPE: security and privacy enhancement framework for mobile devices

B Krupp, N Sridhar, W Zhao - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we present a security and privacy enhancement (SPE) framework for
unmodified mobile operating systems. SPE introduces a new layer between the application …

[PDF][PDF] Adaptive governance and sub-national climate change policy: A comparative analysis of Khyber Pukhtunkhawa and Punjab provinces in Pakistan

M Mumtaz, SH Ali - Complexity, Governance & Networks, 2019 - researchgate.net
This study explores the adaptive governance and effective implementation of climate
policies at the subnational level in a developing country context. We focused on Pakistan as …

[图书][B] Operating Security System Support for Run-Time Security with a Trusted Execution Environment

J González - 2015 - pure.itu.dk
Software services have become an integral part of our daily life. Cyber-attacks have thus
become a problem of increasing importance not only for the IT industry, but for society at …

Mobile security: A systems engineering framework for implementing bring your own device (BYOD) security through the combination of policy management and …

N Zahadat - 2016 - search.proquest.com
With the rapid increase of smartphones and tablets, security concerns have also been on the
rise. Traditionally, Information Technology (IT) departments set up devices, apply security …

Protection motivation theory factors that influence undergraduates to adopt smartphone security measures

M Schneider - 2020 - search.proquest.com
The purpose of this quantitative study was to explore the influence of protection motivation
theory (PMT) constructs on security behaviors of undergraduate students. More specifically …

A novel Internet of Things-centric framework to mine malicious frequent patterns

N Usman, Q Javaid, A Akhunzada, KKR Choo… - IEEE …, 2017 - ieeexplore.ieee.org
There are a number of research challenges associated with Internet of Things (IoT) security,
and one of these challenges is to design novel frameworks to mine malicious frequent …

[PDF][PDF] Zero permission android applications-attacks and defenses

V Moonsamy, L Batten - 3rd Applications and Technologies in Information …, 2012 - cs.ru.nl
Google advertises the Android permission framework as one of the core security features
present on its innovative and flexible mobile platform. The permissions are a means to …

Identifying Protection Motivation Theory Factors that Influence Smartphone Security Measures

M Schneider, S Rahman - … Conference on Big Data (Big Data), 2021 - ieeexplore.ieee.org
Because smartphones are ubiquitous in our society, and undergraduate students use
smartphones extensively, it is necessary to understand how undergraduates can be …

Fine-Grained Privacy Control for Fitness and Health Applications Using the Privacy Management Platform

C Stach - Information Systems Security and Privacy: 4th …, 2019 - Springer
Due to the Internet of Things, novel types of sensors are integrated into everyday objects. A
domain that benefits most is the fitness and health domain. With the advent of the so-called …

A cloud trust authority framework for mobile enterprise information system

H Dai, Q Li, M Qiu, Z Yu, Z Jia - 2014 IEEE 8th International …, 2014 - ieeexplore.ieee.org
With the trend of mobile enterprise information systems, security has become the primary
issue as it relates to business secret, decision, and process control. Hence, we carry out a …