Data security of android applications
Book chapter
Obiri-Yeboah, J. and Qi, M. 2016. Data security of android applications. in: 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery : ICNC-FSKD 2016 : 13-15 August, Changsha, China IEEE Xplore.
Authors | Obiri-Yeboah, J. and Qi, M. |
---|---|
Abstract | Smartphones have become ubiquitous in our society. With a large number of users spending more time and sharing more personal data with these devices, it would be beneficial to gain some understanding of data security. This paper presents different security issues regarding applications of Android systems which are one of the most popular mobile operating systems. The research also sheds a light on how the public feels about a number of privacy and security issues related to permissions and whether any additional factors play into an individual's understanding of the application permission framework. |
Keywords | Androids; Humanoid robots; Security; Privacy; Smart phones; Ecosystems; Mobile communication |
Year | 2016 |
Book title | 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery : ICNC-FSKD 2016 : 13-15 August, Changsha, China |
Publisher | IEEE Xplore |
Output status | Published |
ISBN | 9781509040933 |
Publication dates | |
13 Aug 2016 | |
Publication process dates | |
Deposited | 12 Jan 2018 |
Digital Object Identifier (DOI) | https://doi.org/10.1109/FSKD.2016.7603436 |
Event | The 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2016) |
Permalink -
https://repository.canterbury.ac.uk/item/887w3/data-security-of-android-applications
11
total views0
total downloads2
views this month0
downloads this month
Export as
Related outputs
Security vulnerabilities of popular smart home appliances
Qi, M., Induruwa, A. and Hussain, F. 2021. Security vulnerabilities of popular smart home appliances. in: Proceeding of The Twentieth International Conference on Networks April 18, 2021 to April 22, 2021 - Porto, PortugalHybrid intrusion detection system for smart home applications
Induruwa, A., Qi, M. and Hussain, F. 2020. Hybrid intrusion detection system for smart home applications. in: Mahmood, Z. (ed.) Developing and Monitoring Smart Environments for Intelligent Cities IGI Global.Temporal sparse feature auto-combination deep network for video action recognition
Wang, Q., Gong, D., Qi, M., Shen, Y. and Lei, Y. 2018. Temporal sparse feature auto-combination deep network for video action recognition. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.4487Soundness analytics of composed logical workflow nets
Liu, W., Wang, L., Feng, X., Qi, M., Yan, C. and Li, M. 2017. Soundness analytics of composed logical workflow nets. International Journal of Parallel Programming. https://doi.org/10.1007/s10766-017-0536-8A sliding window-based dynamic load balancing for heterogeneous Hadoop clusters
Liu, Y., Jing, W., Liu, Y., Lv, L., Qi, M. and Xiang, Y. 2016. A sliding window-based dynamic load balancing for heterogeneous Hadoop clusters. Concurrency and Computation: Practice and Experience. 29 (3). https://doi.org/10.1002/cpe.3763Gaussian-Gamma collaborative filtering: a hierarchical Bayesian model for recommender systems
Luo, C., Zhang, B., Xiang, Y. and Qi, M. 2017. Gaussian-Gamma collaborative filtering: a hierarchical Bayesian model for recommender systems. Journal of Computer and System Sciences. https://doi.org/10.1016/j.jcss.2017.03.007Facilitating visual surveillance with motion detections
Qi, M. 2017. Facilitating visual surveillance with motion detections. Concurrency and Computation: Practice and Experience. 29 (3). https://doi.org/10.1002/cpe.3770AL-DDCNN : a distributed crossing semantic gap learning for person re-identification
Cheng, K., Zhan, Y. and Qi, M. 2017. AL-DDCNN : a distributed crossing semantic gap learning for person re-identification. Concurrency and Computation: Practice and Experience. 29 (3). https://doi.org/10.1002/cpe.3766