Details

Title

Secure development model for mobile applications

Journal title

Bulletin of the Polish Academy of Sciences Technical Sciences

Yearbook

2016

Volume

64

Issue

No 3

Authors

Divisions of PAS

Nauki Techniczne

Coverage

495-503

Date

2016

Identifier

DOI: 10.1515/bpasts-2016-0055 ; ISSN 2300-1917

Source

Bulletin of the Polish Academy of Sciences: Technical Sciences; 2016; 64; No 3; 495-503

References

Feng (2013), Mobile application protection solution based on security architecture and OpenID th International Conference on Software Security and Reliability Companion, Proc, 7. ; Zaheer (2013), Enhancing the security of mobile applications by using TEE and th International Conference on Ubiquitous Intelligence and Computing, Proc, 10. ; Souppaya (2013), Guidelines for managing the security of mobile devices in the enterprise, NIST. ; Zhou (2012), Dissecting Android malware : Characterization and evolution rd IEEE Symposium on Security and Privacy, Proc, 33. ; Vidas (2011), All your droid belong to us : A survey of current Android attacks th USENIX Workshop on Offensive Technologies, Proc, 5. ; Enck (2009), Understanding Android security, IEEE Security Privacy, 7, 50, doi.org/10.1109/MSP.2009.26 ; Enck (2011), A study of Android application security th USENIX Security Symposium, Proc, 20. ; Floyd (2006), Mobile application security systems ( MASS ) Labs Technical, Bell Journal, 11. ; Agarwal (2013), ProtectMyPrivacy : Detecting and mitigating privacy leaks on iOS devices using crowdsourcing th Annual International Conference on Mobile Systems Applications and Services, Proc, 1, 97. ; Khan (2012), How secure is your smartphone : an analysis of smartphone security mechanisms International Conference on Cyber Security Cyber Warfare and Digital Forensic, Proc, 76. ; Elkhodr (2012), A proposal to improve the security of mobile banking applications th International Conference on ICT and Knowledge Engineering, Proc, 10. ; Porter Felt (2011), A survey of mobile malware in the wild st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Proc, 1, 3. ; Alhamed (2013), Comparing privacy control methods for smartphone platforms Engineering of Mobile - Enabled Systems, Proc.
×