• Publications
  • Influence
ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading
TLDR
This paper proposes ThinkAir, a framework that makes it simple for developers to migrate their smartphone applications to the cloud and enhances the power of mobile cloud computing by parallelizing method execution using multiple virtual machine (VM) images. Expand
Apex: extending Android permission model and enforcement with user-defined runtime constraints
TLDR
A policy enforcement framework for Android that allows a user to selectively grant permissions to applications as well as impose constraints on the usage of resources and an extended package installer that allows the user to set these constraints through an easy-to-use interface is presented. Expand
Taming Information-Stealing Smartphone Applications (on Android)
TLDR
A system called TISSA is developed that implements a new privacy mode in smartphones that can empower users to flexibly control in a fine-grained manner what kinds of personal information will be accessible to an application. Expand
PBDM: a flexible delegation model in RBAC
TLDR
This paper proposes a flexible delegation model named Permission-based Delegation Model (PBDM), which is built on the well known RBAC96 model, and supports both role and permission level delegation, which provides great flexibility in authority management. Expand
Formal model and policy specification of usage control
TLDR
A formal model and logical specification of UCON with an extension of Lamport's temporal logic of actions (TLA) is developed and shown the flexibility and expressive capability of this formal model by specifying the core models of U CON and some applications. Expand
Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing
TLDR
A new elastic application model that enables seamless and transparent use of cloud resources to augment the capability of resource-constrained mobile devices is proposed and promising results of the proposed application model are demonstrated. Expand
Securing elastic applications on mobile devices for cloud computing
TLDR
This paper aims to build elastic applications which augment resource-constrained platforms, such as mobile phones, with elastic computing resources from clouds, and proposes a solution for authentication and secure session management between weblets running device side and those on the cloud. Expand
MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication
TLDR
The proposed MobiCloud framework enhances the operation of the ad hoc network itself by treating mobile devices as service nodes and will enhance communication by addressing trust management, secure routing, and risk management issues in the network. Expand
Towards an Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms
TLDR
An elastic application can augment the capabilities of a mobile device including computation power, storage, and network bandwidth, with the light of dynamic execution configuration according to device’s status. Expand
Chrome Extensions: Threat Analysis and Countermeasures
TLDR
This study demonstrates that malicious Chrome extensions pose serious threats, including both information dispersion and harvesting, to browsers and proposes a set of countermeasures that enforce the policies of microprivilege management and differentiating DOM elements. Expand
...
1
2
3
4
5
...