期刊文献+
共找到165篇文章
< 1 2 9 >
每页显示 20 50 100
Risks behind Device Information Permissions in Android OS
1
作者 Ali Alshehri Anthony Hewins +3 位作者 Maria McCulley Hani Alshahrani Huirong Fu Ye Zhu 《Communications and Network》 2017年第4期219-234,共16页
In the age of smartphones, people do most of their daily work using their smartphones due to significant improvement in smartphone technology. When comparing different platforms such as Windows, iOS, Android, and Blac... In the age of smartphones, people do most of their daily work using their smartphones due to significant improvement in smartphone technology. When comparing different platforms such as Windows, iOS, Android, and Blackberry, Android has captured the highest percentage of total market share [1]. Due to this tremendous growth, cybercriminals are encouraged to penetrate various mobile marketplaces with malicious applications. Most of these applications require device information permissions aiming to collect sensitive data without user’s consent. This paper investigates each element of system information permissions and illustrates how cybercriminals can harm users’ privacy. It presents some attack scenarios using READ_PHONE_STATE permission and the risks behind it. In addition, this paper refers to possible attacks that can be performed when additional permissions are combined with READ_PHONE_STATE permission. It also discusses a proposed solution to defeat these types of attacks. 展开更多
关键词 ANDROID SECURITY PRIVACY DEVICE Identifiers permissions
暂未订购
Associated Risks in Mobile Applications Permissions
2
作者 Mohammed Al Jutail Mousa Al-Akhras Abdulaziz Albesher 《Journal of Information Security》 2019年第2期69-90,共22页
Mobile applications affect user’s privacy based on the granted application’s permissions as attackers exploit mobile application permissions in Android and other mobile operating systems. This research divides permi... Mobile applications affect user’s privacy based on the granted application’s permissions as attackers exploit mobile application permissions in Android and other mobile operating systems. This research divides permissions based on Google’s classification of dangerous permissions into three groups. The first group contains the permissions that can access user’s private data such as reading call log. The second group contains the permissions that can modify user’s data such as modifying the numbers in contacts. The third group contains the remaining permissions which can track the location, and use the microphone and other sensitive issues that can spy on the user. This research is supported by a study that was conducted on 100 participants in Saudi Arabia to show the level of users’ awareness of associated risks in mobile applications permissions. Associations among the collected data are also analyzed. This research fills the gap in user’s awareness by providing best practices in addition to developing a new mobile application to help users decide whether an application is safe to be installed and used or not. This application is called “Sparrow” and is available in Google Play Store. 展开更多
关键词 Mobile PERMISSION Android PRIVACY ATTACK Security ASSOCIATION APRIORI
暂未订购
Toward Secure and Auditable Data Sharing:A Cross-Chain CP-ABE Framework
3
作者 Ye Tian Zhuokun Fan Yifeng Zhang 《Computers, Materials & Continua》 2026年第4期1509-1529,共21页
Amid the increasing demand for data sharing,the need for flexible,secure,and auditable access control mechanisms has garnered significant attention in the academic community.However,blockchain-based ciphertextpolicy a... Amid the increasing demand for data sharing,the need for flexible,secure,and auditable access control mechanisms has garnered significant attention in the academic community.However,blockchain-based ciphertextpolicy attribute-based encryption(CP-ABE)schemes still face cumbersome ciphertext re-encryption and insufficient oversight when handling dynamic attribute changes and cross-chain collaboration.To address these issues,we propose a dynamic permission attribute-encryption scheme for multi-chain collaboration.This scheme incorporates a multiauthority architecture for distributed attribute management and integrates an attribute revocation and granting mechanism that eliminates the need for ciphertext re-encryption,effectively reducing both computational and communication overhead.It leverages the InterPlanetary File System(IPFS)for off-chain data storage and constructs a cross-chain regulatory framework—comprising a Hyperledger Fabric business chain and a FISCO BCOS regulatory chain—to record changes in decryption privileges and access behaviors in an auditable manner.Security analysis shows selective indistinguishability under chosen-plaintext attack(sIND-CPA)security under the decisional q-Parallel Bilinear Diffie-Hellman Exponent Assumption(q-PBDHE).In the performance and experimental evaluations,we compared the proposed scheme with several advanced schemes.The results show that,while preserving security,the proposed scheme achieves higher encryption/decryption efficiency and lower storage overhead for ciphertexts and keys. 展开更多
关键词 Data sharing blockchain attribute-based encryption dynamic permissions
在线阅读 下载PDF
INSTRUCTIONS FOR AUTHORS
4
《Applied Mathematics and Mechanics(English Edition)》 2025年第11期I0001-I0002,共2页
1Legal requirements.The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and t... 1Legal requirements.The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and that the publisher will not be held legally responsible should there be any claims for compensation.Authors wishing to include figures or text passages that have already been published elsewhere are required to obtain permission from the copyright holder(s)and to include evidence that such permission has been granted when submitting their papers.Any material received without such evidence will be assumed to originate from the authors. 展开更多
关键词 permissions COPYRIGHT third parties manuscript submission figures text passages publisher liability legal requirements
在线阅读 下载PDF
INSTRUCTIONS FOR AUTHORS
5
《Applied Mathematics and Mechanics(English Edition)》 2025年第12期I0011-I0012,共2页
1Legal requirements The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and t... 1Legal requirements The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and that the publisher will not be held legally responsible should there be any claims for compensation.Authors wishing to include figures or text passages that have already been published elsewhere are required to obtain permission from the copyright holder(s)and to include evidence that such permission has been granted when submitting their papers.Any material received without such evidence will be assumed to originate from the authors. 展开更多
关键词 permissions COPYRIGHT third parties manuscript submission figures text passages publisher liability legal requirements
在线阅读 下载PDF
China to Issue Permissions for New Synthetic Ammonia Project
6
作者 Peter Zong 《China Chemical Reporter》 2010年第6期24-24,共11页
China Nitrogenous Fertilizer Industry Association(CNFIA) disclosed on March 12th thatthe drafted permission conditions for the syntheticammonia will soon be submitted to theMinistry of Industry and Information Technol... China Nitrogenous Fertilizer Industry Association(CNFIA) disclosed on March 12th thatthe drafted permission conditions for the syntheticammonia will soon be submitted to theMinistry of Industry and Information Technologyof China for approval.The draftedpermissions, drawn by CFNIA, proposedprimarily the minimum capacity for new syntheticammonia project is 300 000 t/a, mean- 展开更多
关键词 APPROVAL PERMISSION submitted AMMONIA SHANDONG SEC
全文增补中
Permissive hypercapnia combined with goal-directed fluid therapy improve postoperative mental health in elderly patients undergoing laparoscopic surgery
7
作者 Li Yuan Xiao-Min Zhang +4 位作者 Na Liu Jun-Qi Shi Xiao-Jie Sun Guo-Li Li Jin-Liang Teng 《World Journal of Psychiatry》 2025年第7期145-155,共11页
BACKGROUND An investigation is undertaken to assess the effects of permissive hypercapnia(PH)combined with goal-directed fluid therapy(GDFT)on postoperative recovery and psychological well-being among elderly patients... BACKGROUND An investigation is undertaken to assess the effects of permissive hypercapnia(PH)combined with goal-directed fluid therapy(GDFT)on postoperative recovery and psychological well-being among elderly patients undergoing laparoscopic surgical procedures.AIM To ascertain whether the combination of PH and GDFT improves clinical recovery indicators,reduces postoperative complications,and alleviates anxiety,depression,and inflammatory responses in this specific patient population.METHODS A total of 120 elderly patients who underwent laparoscopic surgery in our hospital from July 2023 to June 2024 were randomly allocated into two groups:A control group(n=60)and a study group(n=60).In the control group,conventional anesthesia ventilation and fluid management protocols were administered,while in the study group,PH(with intraoperative PaCO_(2) maintained between 45-55 mmHg)was combined with GDFT.Postoperative recovery indicators,including the time to first flatus,time to ambulation,and length of hospital stay,were compared between the groups.Additionally,complication rates,anxietydepression scores assessed via the Hospital Anxiety and Depression scale,and levels of inflammatory factors were analyzed to evaluate the outcomes.RESULTS When compared with the control group,the study group demonstrated significantly shorter time to first flatus[(48.3±6.2)hours vs(62.5±7.8)hours],time to ambulation[(28.4±4.2)hours vs(38.6±5.1)hours],and length of hospital stay[(5.2±1.1)days vs(7.4±1.3)days](P<0.05).A significantly lower postoperative complication rate was observed in the study group(8.3%vs 21.7%,P<0.05).Additionally,at 3 days postoperatively,significantly lower anxiety scores[(5.2±1.4)vs(7.8±1.6)]and depression scores[(4.8±1.2)vs(7.1±1.5)]were recorded in the study group compared to the control group(P<0.05);Furthermore,at 24 hours postoperatively,serum levels of interleukin-6,tumor necrosis factorα,and C-reactive protein were found to be significantly lower in the study group than in the control group(P<0.05).CONCLUSION Postoperative recovery is significantly expedited,postoperative complications are markedly reduced,anxietydepression status is substantially improved,and inflammatory response is notably diminished in elderly patients undergoing laparoscopic surgery when PH is combined with GDFT,thereby making it worthy of clinical application. 展开更多
关键词 Permissive hypercapnia Goal-directed fluid therapy Laparoscopic surgery Elderly patients Enhanced recovery Anxiety and depression
暂未订购
On the Evils of Torture and Its Permissibility:A Discussion Centered on Kramer’s View of Torture
8
作者 ZHANG Zhucheng PAN Yingzhao(Translated) 《The Journal of Human Rights》 2025年第1期209-233,共25页
In the legal and philosophical study of torture,two major problems arise:Why is torture evil(Problem 1)?And is there a form of permissible torture(Problem 2)?The key issue in Problem 1 is demonstrating the uniqueness ... In the legal and philosophical study of torture,two major problems arise:Why is torture evil(Problem 1)?And is there a form of permissible torture(Problem 2)?The key issue in Problem 1 is demonstrating the uniqueness of the evils of torture,while Problem 2 aims to find a suitable theory to balance the“intuitive rejection”and“intuition of exceptional cases”in the ticking bomb scenario.Existing mainstream approaches have generally failed to resolve these issues.However,Matthew Kramer’s view of torture addresses both aspects of these problems.For Problem 1,Kramer adopts a perpetrator-centered viewpoint,arguing that torture undermines the moral integrity of the perpetrator.Regarding Problem 2,he suggests that the situation we face is a moral conflict in which the use of torture is morally wrong but might be the best action in a given context,granting it a weaker form of permissibility.However,in terms of the evils of torture,Kramer fails to explain its uniqueness.His theory cannot apply to all types of torture,and his perpetrator-centered argument contains logical flaws.Regarding the permissibility of torture,while Kramer’s overall approach is correct,he does not provide a reasonable explanation of the moral obligation to“forbid torture”or the prima facie surrounding it.A correct view of torture should adhere to an inmate-centered viewpoint,understanding the evils of torture in an additive manner in Problem 1,and acknowledging the existence of moral conflict in Problem 2.It should not only demonstrate that,in some situations,the use of torture may be the morally best option,but also show that the moral obligation to prohibit torture is simply outweighed under these circumstances. 展开更多
关键词 TORTURE inquisition by torture Matthew Kramer evil of torture permissibility of torture
原文传递
SecureVFL: Privacy-preserving multi-party vertical federated learning based on blockchain and RSS
9
作者 Mochan Fan Zhipeng Zhang +4 位作者 Zonghang Li Gang Sun Hongfang Yu Jiawen Kang Mohsen Guizani 《Digital Communications and Networks》 2025年第3期837-849,共13页
Vertical Federated Learning(VFL),which draws attention because of its ability to evaluate individuals based on features spread across multiple institutions,encounters numerous privacy and security threats.Existing sol... Vertical Federated Learning(VFL),which draws attention because of its ability to evaluate individuals based on features spread across multiple institutions,encounters numerous privacy and security threats.Existing solutions often suffer from centralized architectures,and exorbitant costs.To mitigate these issues,in this paper,we propose SecureVFL,a decentralized multi-party VFL scheme designed to enhance efficiency and trustworthiness while guaranteeing privacy.SecureVFL uses a permissioned blockchain and introduces a novel consensus algorithm,Proof of Feature Sharing(PoFS),to facilitate decentralized,trustworthy,and high-throughput federated training.SecureVFL introduces a verifiable and lightweight three-party Replicated Secret Sharing(RSS)protocol for feature intersection summation among overlapping users.Furthermore,we propose a(_(2)^(4))-sharing protocol to achieve federated training in a four-party VFL setting.This protocol involves only addition operations and exhibits robustness.SecureVFL not only enables anonymous interactions among participants but also safeguards their real identities,and provides mechanisms to unmask these identities when malicious activities are performed.We illustrate the proposed mechanism through a case study on VFL across four banks.Finally,our theoretical analysis proves the security of SecureVFL.Experiments demonstrated that SecureVFL outperformed existing multi-party VFL privacy-preserving schemes,such as MP-FedXGB,in terms of both overhead and model performance. 展开更多
关键词 Permissioned blockchain Vertical federated learning Privacy protection Replicated secret sharing
在线阅读 下载PDF
Correction:Impact of twice-a-day transcranial direct current stimulation interuention on cognitive function and motor cortex plasticity in patients with Alzheimer's disease
10
《General Psychiatry》 2025年第5期415-415,共1页
An unauthorised version of the Chinese MMSE was used in this article by the authors without permission from the copyright owner,PAR.Necessary permission has now been retrospectively obtained from PAR.The MMSE is a cop... An unauthorised version of the Chinese MMSE was used in this article by the authors without permission from the copyright owner,PAR.Necessary permission has now been retrospectively obtained from PAR.The MMSE is a copyrighted instrument and may not be used or reproduced in whole or in part,in any form or language,or by any means without the written permission of PAR(www.parinc.com). 展开更多
关键词 transcranial direct current stimulation motor cortex plasticity COPYRIGHT cognitive function retrospective permission unauthorized version alzheimer's disease
暂未订购
Corrigendum regarding previously published articles
11
《Data Science and Management》 2025年第1期116-116,共1页
The editors regret that the following statements were missing in the published version for the following articles that appeared in previous issues of Data Science and Management:1.“Audiovisual speech recognition base... The editors regret that the following statements were missing in the published version for the following articles that appeared in previous issues of Data Science and Management:1.“Audiovisual speech recognition based on a deep convolutional neural network”(Data Science and Management,2024,7(1):25–34).https://doi.org/10.1016/j.dsm.2023.10.002.Ethics statement:The authors declare the Institutional Ethics Committee confirmed that no ethical review was required for this study.The authors have taken the participants’permission and consent to participate in this study. 展开更多
关键词 deep convolutional neural network data data science participant permission ethical review audiovisual speech recognition ethics statement deep convolutional neural network institutional ethics committee
在线阅读 下载PDF
Android Permission机制的实现与安全分析 被引量:6
12
作者 张中文 雷灵光 王跃武 《信息网络安全》 2012年第8期3-6,共4页
Permission机制作为Android安全的重要组成部分,受到了越来越多的关注,已有的研究主要集中在对应用程序申请的Permission进行静态分析上。文章从分析Permission机制的实现过程入手,分析了Permission机制自身的安全问题,发现了一个Permis... Permission机制作为Android安全的重要组成部分,受到了越来越多的关注,已有的研究主要集中在对应用程序申请的Permission进行静态分析上。文章从分析Permission机制的实现过程入手,分析了Permission机制自身的安全问题,发现了一个Permission机制漏洞。应用程序利用该漏洞可以绕过权限管理,主动提升应用程序的访问权限,为后续攻击提供支持。同时文章也对Permission机制其它方面的安全特性进行了分析。 展开更多
关键词 ANDROID系统 PERMISSION 安全 漏洞
在线阅读 下载PDF
一种增强的Android安全机制模型 被引量:9
13
作者 陈伟鹤 邱道龙 《无线通信技术》 2014年第1期37-41,共5页
随着Android系统的日益流行,其安全问题受到了越来越多的关注。尽管Android Permission机制能在一定程度上保证安全性,但在实际应用中却缺乏灵活性,基于此提出了一种与Apex相兼容的策略模型。该方法主要针对Apex的安装程序包Poly。在Plo... 随着Android系统的日益流行,其安全问题受到了越来越多的关注。尽管Android Permission机制能在一定程度上保证安全性,但在实际应用中却缺乏灵活性,基于此提出了一种与Apex相兼容的策略模型。该方法主要针对Apex的安装程序包Poly。在Ploy安装程序之前先对应用程序和权限进行分析检测,然后将检测分析后的权限呈现给用户。实验结果表明在造成一定性能损失的情况下,新的框架可以有效减少用户所需设置的权限。 展开更多
关键词 ANDROID ANDROID PERMISSION 安全 策略模型
原文传递
Android操作系统的安全机制研究 被引量:2
14
作者 朱长江 杨一平 《电脑知识与技术》 2013年第9期5628-5629,共2页
Android系统自推出以来,就以明显的优势逐渐扩大市场占有份额。Android是一个开放性的系统,备受开发者的青睐,其安全性至关重要。研究了Android系统的用户ID机制、应用程序签名机制、沙箱隔离机制等安全策略,分析了它在硬件方面、Li... Android系统自推出以来,就以明显的优势逐渐扩大市场占有份额。Android是一个开放性的系统,备受开发者的青睐,其安全性至关重要。研究了Android系统的用户ID机制、应用程序签名机制、沙箱隔离机制等安全策略,分析了它在硬件方面、Linux内核方面及Android自身权限机制方面存在的安全隐患。 展开更多
关键词 ANDROID 安全机制 PERMISSION
在线阅读 下载PDF
浅谈司法公证材料的英译
15
作者 周永秀 毕研韬 《语言教育》 2002年第3期35-36,共2页
司法公证翻译因关系到当事人在境内外的权利和义务而应格外严谨准确。笔者近年来受有关部门及当事人的委托承担了部分公证材料的翻译,从各国签证官和国外机构获得了大量有益的信息反馈,现不揣冒昧从文体特征。
关键词 机构名称 信息反馈 语法方面 thereafter translated 语义模糊 大学外国语 WISDOM PERMISSION 发证日期
在线阅读 下载PDF
Investigation of Android Malware Using Deep Learning Approach
16
作者 V.Joseph Raymond R.Jeberson Retna Raj 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2413-2429,共17页
In recent days the usage of android smartphones has increased exten-sively by end-users.There are several applications in different categories bank-ing/finance,social engineering,education,sports andfitness,and many mor... In recent days the usage of android smartphones has increased exten-sively by end-users.There are several applications in different categories bank-ing/finance,social engineering,education,sports andfitness,and many more applications.The android stack is more vulnerable compared to other mobile plat-forms like IOS,Windows,or Blackberry because of the open-source platform.In the Existing system,malware is written using vulnerable system calls to bypass signature detection important drawback is might not work with zero-day exploits and stealth malware.The attackers target the victim with various attacks like adware,backdoor,spyware,ransomware,and zero-day exploits and create threat hunts on the day-to-day basics.In the existing approach,there are various tradi-tional machine learning classifiers for building a decision support system with limitations such as low detection rate and less feature selection.The important contents taken for building model from android applications like Intent Filter,Per-mission Signature,API Calls,and System commands are taken from the manifestfile.The function parameters of various machine and deep learning classifiers like Nave Bayes,k-Nearest Neighbors(k-NN),Support Vector Machine(SVM),Ada Boost,and Multi-Layer Perceptron(MLP)are done for effective results.In our pro-posed work,we have used an unsupervised learning multilayer perceptron with multiple target labels and built a model with a better accuracy rate compared to logistic regression,and rank the best features for detection of applications and clas-sify as malicious or benign can be used as threat model by online antivirus scanners. 展开更多
关键词 Android application permissions multilayer perception relief scoring
在线阅读 下载PDF
一类SCO OpenServer 5中远程访问故障的分析和处理
17
作者 黄宁 李岚 《江西科学》 2007年第1期79-80,85,共3页
提出一类SCO OpenServer 5中远程访问常见的问题,分析其原因,提出解决方法,找到了解决这类问题的关键。
关键词 远程访问 对等用户 Rcmd Rlogin PERMISSION Denied
在线阅读 下载PDF
基于权限管理的Android应用行为检测 被引量:8
18
作者 刘智伟 孙其博 《信息网络安全》 2014年第6期72-77,共6页
随着智能移动终端数量的增加,越来越多的安全问题成为困扰终端进一步发展的障碍。当前市场大部分安全软件不能够实现对应用行为的实时监控,极少安全软件需要root权限才能实现应用行为实时的监控。文章基于Android应用框架层的定制,利用A... 随着智能移动终端数量的增加,越来越多的安全问题成为困扰终端进一步发展的障碍。当前市场大部分安全软件不能够实现对应用行为的实时监控,极少安全软件需要root权限才能实现应用行为实时的监控。文章基于Android应用框架层的定制,利用Android系统Permission机制的动态检查模式实现应用运行时行为的检测。Android应用通过<user-permission>申请所需权限,在运行过程中需要调用对应的API或者访问系统数据时,会发生系统权限检查,从而实现对应用行为的监控。相对在应用层进行应用行为的监控要更简洁有效,通过在框架层的定制更好地实现了对应用行为的监控,同时带给系统的损耗更小。 展开更多
关键词 应用行为 Permission机制 权限动态检查
在线阅读 下载PDF
基于API和Permission的Android恶意软件静态检测方法研究 被引量:3
19
作者 杨鸣坤 罗锦光 +1 位作者 欧跃发 慕德俊 《计算机应用与软件》 北大核心 2020年第4期53-58,104,共7页
当前大量的Android恶意软件在后台收集用户的位置信息、通话记录、电话号码及短信等信息并将其上传至指定服务器,造成了难以估量的危害。为解决此问题,提出一种Android恶意软件静态检测方法。对收集到的训练集中的所有APK文件进行静态... 当前大量的Android恶意软件在后台收集用户的位置信息、通话记录、电话号码及短信等信息并将其上传至指定服务器,造成了难以估量的危害。为解决此问题,提出一种Android恶意软件静态检测方法。对收集到的训练集中的所有APK文件进行静态反编译,提取其中的静态信息;对静态信息中的API和Permission进行统计学分析,得到API和Permission在恶意APK和正常APK中的使用率;根据它们的使用率确定基准API和Permission集合,将每一个APK转换成可参与计算的关于API和Permission的特征向量;利用改进的k-NN分类器,对待检测的APK进行分类判定。实验结果表明,该方法可以有效地对APK进行恶意分类。 展开更多
关键词 ANDROID 恶意软件 静态检测 PERMISSION 机器学习
在线阅读 下载PDF
Permissible Minimum Thickness in Asymmetrical Cold Rolling 被引量:6
20
作者 TANG De-lin LIU Xiang-hua +1 位作者 LI Xiang-yu PENG Liang-gui 《Journal of Iron and Steel Research International》 SCIE EI CAS CSCD 2013年第11期21-26,共6页
The minimum rolling thickness in asymmetrical rolling was analyzed compared with that in symmetrical rolling. The differential equilibrium equations on forces were established to calculate the asymmetrical rolling for... The minimum rolling thickness in asymmetrical rolling was analyzed compared with that in symmetrical rolling. The differential equilibrium equations on forces were established to calculate the asymmetrical rolling force equation by slab method. An implicit expression of the minimum rolling thickness was then derived from the rolling force equation and Hitehcock equation. The results show that permissible minimum rolling thickness of asymmetrical rolling only exists within a specific range of cross-shear ratio, which is termed the cross-shear zone proportion of the whole de- formation zone. Numerical computation was carried out to obtain a discrete solution of the minimum rolling thick- ness. Experiments were designed to investigate the influence factors on cross-shear ratio. Finally, experimental re- sults prove the correctness of the improved formula given. 展开更多
关键词 asymmetrical roiling minimum permissible thickness cross-shear ratio asymmetrical ratio friction peak value
原文传递
上一页 1 2 9 下一页 到第
使用帮助 返回顶部