基于Android系统的隐私保护技术综述
rmission model and enforcement with user-defined runtime constraints." Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM,2010:328-332[6] Felt, Adrienne Porter, et al. "Permission Re-Delegation: Attacksand Defenses." USENIX Security Symposium,2011.[7] Dietz, Michael, et al. "QUIRE: Lightweight Provenance for SmartPhone Operating Syste
<<上一页 下一页>>
广州市越秀区图书馆版权所有。
联系电话:020-87673002
本站访问人数: