DAAC: Digital asset access control in a unified blockchain based e-health system

S Biswas, K Sharif, F Li, I Alam… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The use of the Internet of Things and modern technologies has boosted the expansion of e-
health solutions significantly and allowed access to better health services and remote …

A survey on the evolution of privacy enforcement on smartphones and the road ahead

J Pennekamp, M Henze, K Wehrle - Pervasive and Mobile Computing, 2017 - Elsevier
With the increasing proliferation of smartphones, enforcing privacy of smartphone users
becomes evermore important. Nowadays, one of the major privacy challenges is the …

A model‐based framework for inter‐app Vulnerability analysis of Android applications

A Nirumand, B Zamani, B Tork‐Ladani… - Software: Practice …, 2023 - Wiley Online Library
Android users install various apps, such as banking apps, on their smart devices dealing
with user‐sensitive information. The Android framework, via Inter‐Component …

[PDF][PDF] Bat optimization algorithm for wrapper-based feature selection and performance improvement of android malware detection

OPA PER - 2021 - academia.edu
Android malware is a serious threat to the mobile users and their data. The losses incurred
are unimaginable, which stretch to the extent of identity theft, financial loss, sensitive …

Libcapsule: Complete confinement of third-party libraries in android applications

J Qiu, X Yang, H Wu, Y Zhou, J Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Android application (or app) developers increasingly integrate third-party libraries to enrich
the functionality of their apps. However, current permission model on Android cannot …

Challenges in Blockchain as a Solution for IoT Ecosystem Threats and Access Control: A Survey

SC Avik, S Biswas, MAR Ahad, Z Latif… - arxiv preprint arxiv …, 2023 - arxiv.org
The Internet of Things (IoT) is increasingly influencing and transforming various aspects of
our daily lives. Contrary to popular belief, it raises security and privacy issues as it is used to …

Unlocking User Privacy: A Systematic Survey of Factors and Methods in Predicting App Permission Decisions

R Lavranou, A Tsohou - IFIP International Conference on Artificial …, 2024 - Springer
Mobile devices have become an indispensable part of everyday life for most people and
have improved our lives in many ways, offering a multitude of possibilities through the …

Autonomous permission recommendation

H Gao, C Guo, D Huang, X Hou, Y Wu, J Xu, Z He… - IEEE …, 2020 - ieeexplore.ieee.org
Modern smartphone operating systems (eg, Android 6.0 and later versions) employ an ask-
on-first-use policy to regulate app permissions. To assist users in policy decisions, relevant …

Using ad-related network behavior to distinguish ad libraries

MY Su, HS Wei, XY Chen, PW Lin, DY Qiu - Applied Sciences, 2018 - mdpi.com
Mobile app ads pose a far greater security threat to users than adverts on computer
browsers. This is because app developers must embed a Software Development Kit (SDK) …

Unraveling the Complexity of Mobile Application Permissions: Strategies to Enhance Users' Privacy Education

R Lavranou, S Karagiannis, A Tsohou… - European Journal of …, 2023 - ej-eng.org
Smartphones and other mobile devices have seamlessly integrated into our daily lives
offering a multitude of possibilities through various applications. However, this convenience …