{"title":"移动安全应用:忠诚的守卫还是虚伪的小偷?","authors":"Yonglin Sun, Yongjun Wang, Xiaobin Wang","doi":"10.1109/3PGCIC.2014.125","DOIUrl":null,"url":null,"abstract":"Mobile security app plays an important role in managing third-party apps and protecting user's data on smart phone. However, who can guarantee mobile security app's loyalty, or who can determine a given mobile security app is not a hypocritical thief? Thus, it is very necessary to establish a supervision mechanism to restrict mobile security app for user's privacy, but there isn't any technique to supervise the behavior of security apps till now. We summarized the security scenario of android smart phone from five aspects, and proposed a Competitive Supervision Mechanism and three theoretical supportive techniques to supervise mobile security app for user's security concern.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Mobile Security Apps: Loyal Gaurds or Hypocritical Thieves?\",\"authors\":\"Yonglin Sun, Yongjun Wang, Xiaobin Wang\",\"doi\":\"10.1109/3PGCIC.2014.125\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile security app plays an important role in managing third-party apps and protecting user's data on smart phone. However, who can guarantee mobile security app's loyalty, or who can determine a given mobile security app is not a hypocritical thief? Thus, it is very necessary to establish a supervision mechanism to restrict mobile security app for user's privacy, but there isn't any technique to supervise the behavior of security apps till now. We summarized the security scenario of android smart phone from five aspects, and proposed a Competitive Supervision Mechanism and three theoretical supportive techniques to supervise mobile security app for user's security concern.\",\"PeriodicalId\":395610,\"journal\":{\"name\":\"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/3PGCIC.2014.125\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/3PGCIC.2014.125","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mobile Security Apps: Loyal Gaurds or Hypocritical Thieves?
Mobile security app plays an important role in managing third-party apps and protecting user's data on smart phone. However, who can guarantee mobile security app's loyalty, or who can determine a given mobile security app is not a hypocritical thief? Thus, it is very necessary to establish a supervision mechanism to restrict mobile security app for user's privacy, but there isn't any technique to supervise the behavior of security apps till now. We summarized the security scenario of android smart phone from five aspects, and proposed a Competitive Supervision Mechanism and three theoretical supportive techniques to supervise mobile security app for user's security concern.