Barrera, D., Kayacik, H. G., van Oorschot, P. C., and Somay-
aji, A. (2010). A Methodology for Empirical Analysis
of Permission-based Security Models and Its Appli-
cation to Android. In Proceedings of the 17
th
ACM
Conference on Computer and Communications Secu-
rity, CCS ’10, pages 73–84.
Conti, M., Nguyen, V. T. N., and Crispo, B. (2011). CR
ˆ
ePE:
Context-related Policy Enforcement for Android, pages
331–345. Springer.
Davies, N., Taft, N., Satyanarayanan, M., Clinch, S., and
Amos, B. (2016). Privacy Mediators: Helping IoT
Cross the Chasm. In Proceedings of the 17
th
Interna-
tional Workshop on Mobile Computing Systems and
Applications, HotMobile ’16, pages 39–44.
Davis, B. and Chen, H. (2013). RetroSkeleton: Retrofitting
Android Apps. In Proceeding of the 11
th
Annual Inter-
national Conference on Mobile Systems, Applications,
and Services, MobiSys ’13, pages 181–192.
Davis, B., Sanders, B., Khodaverdian, A., and Chen, H.
(2012). I-ARM-Droid: A Rewriting Framework for In-
App Reference Monitors for Android Applications. In
Proceedings of the 2012 IEEE Conference on Mobile
Security Technologies, MoST ’12, pages 28:1–28:9.
Dey, A. K. (2001). Understanding and Using Context. Per-
sonal and Ubiquitous Computing, 5(1):4–7.
Enck, W., Ongtang, M., and McDaniel, P. (2009). Under-
standing Android Security. IEEE Security and Privacy,
7(1):50–57.
Felt, A. P., Ha, E., Egelman, S., Haney, A., Chin, E., and
Wagner, D. (2012). Android Permissions: User Atten-
tion, Comprehension, and Behavior. In Proceedings of
the Eighth Symposium on Usable Privacy and Security,
SOUPS ’12, pages 3:1–3:14.
Fragkaki, E., Bauer, L., Jia, L., and Swasey, D. (2012).
Modeling and Enhancing Android’s Permission System,
pages 1–18. Springer.
Google Inc. (2017). Android Things.
https://developer.android.com/things.
Hamlen, K. W. and Jones, M. (2008). Aspect-oriented In-
lined Reference Monitors. In Proceedings of the Third
ACM SIGPLAN Workshop on Programming Languages
and Analysis for Security, PLAS ’08, pages 11–20.
Hilty, M., Pretschner, A., Basin, D., Schaefer, C., and Walter,
T. (2007). A Policy Language for Distributed Usage
Control, pages 531–546. Springer.
Istepanian, R. S. H., Hu, S., Philip, N., and Sungoor, A.
(2011). The Potential of Internet of m-health Things
“m-IoT” for Non-Invasive Glucose Level Sensing. In
Proceedings of the 2011 Annual International Confe-
rence of the IEEE Engineering in Medicine and Bio-
logy Society, EMBS ’11, pages 5264–5266.
Kalkov, I., Franke, D., Schommer, J. F., and Kowalewski, S.
(2012). A Real-time Extension to the Android Platform.
In Proceedings of the 10
th
International Workshop on
Java Technologies for Real-time and Embedded Sys-
tems, JTRES ’12, pages 105–114.
Kn
¨
oll, M. (2009). Diabetes City: How Urban Game De-
sign Strategies Can Help Diabetics, pages 200–204.
Springer.
Kn
¨
oll, M. (2010). “On the Top of High Towers . . . ” Discus-
sing Locations in a Mobile Health Game for Diabetics.
In Proceedings of the 2010 IADIS International Confe-
rence Game and Entertainment Technologies, MCCSIS
’10, pages 61–68.
Kovatchev, B. P., Gonder-Frederick, L. A., Cox, D. J., and
Clarke, W. L. (2004). Evaluating the Accuracy of
Continuous Glucose-Monitoring Sensors. Diabetes
Care, 27(8):1922–1928.
Nauman, M., Khan, S., and Zhang, X. (2010). Apex: Exten-
ding Android Permission Model and Enforcement with
User-defined Runtime Constraints. In Proceedings of
the 5
th
ACM Symposium on Information, Computer
and Communications Security, ASIACCS ’10, pages
328–332.
Park, J. and Sandhu, R. (2004). The UCON
ABC
Usage
Control Model. ACM Transactions on Information and
System Security, 7(1):128–174.
Perera, C., Zaslavsky, A., and Christen, P. (2014). Con-
text Aware Computing for The Internet of Things: A
Survey. IEEE Communications Surveys & Tutorials,
16(1):414–454.
Rasthofer, S., Arzt, S., Lovat, E., and Bodden, E.
(2014). DroidForce: Enforcing Complex, Data-centric,
System-wide Policies in Android. In Proceedings of
the 2014 Ninth International Conference on Availabi-
lity, Reliability and Security, ARES ’14, pages 40–49.
Russello, G., Crispo, B., Fernandes, E., and Zhauniarovich,
Y. (2011). YAASE: Yet Another Android Security
Extension. In Proceeding of the 2011 IEEE Third In-
ternational Conference on Privacy, Security, Risk and
Trust and 2011 IEEE Third International Conference
on Social Computing, PASSAT ’11, pages 1033–1040.
Schreckling, D., Posegga, J., and Hausknecht, D. (2012).
Constroid: Data-centric Access Control for Android.
In Proceedings of the 27
th
Annual ACM Symposium on
Applied Computing, SAC ’12, pages 1478–1485.
Scoccia, G. L., Malavolta, I., Autili, M., Di Salle, A., and
Inverardi, P. (2017). User-centric Android Flexible
Permissions. In Proceedings of the 2017 IEEE/ACM
39
th
International Conference on Software Engineering
Companion, ICSE-C ’17, pages 365–367.
Sekar, L. P., Gankidi, V. R., and Subramanian, S. (2012).
Avoidance of Security Breach Through Selective Per-
missions in Android Operating System. ACM SIGS-
OFT Software Engineering Notes, 5(37):1–9.
Sellwood, J. and Crampton, J. (2013). Sleeping Android:
The Danger of Dormant Permissions. In Proceedings
of the Third ACM Workshop on Security and Privacy
in Smartphones & Mobile Devices, SPSM ’13, pages
55–66.
Sicari, S., Rizzardi, A., Grieco, L. A., and Coen-Porisini, A.
(2015). Security, privacy and trust in Internet of Things:
The road ahead. Computer Networks, 76:146–164.
Stach, C. (2013). How to Assure Privacy on Android Phones
and Devices? In Proceedings of the 2013 IEEE 14
th
In-
ternational Conference on Mobile Data Management,
MDM ’13, pages 350–352.
Stach, C. (2016). Secure Candy Castle — A Prototype for
Privacy-Aware mHealth Apps. In Proceedings of the
ACCESSORS - A Data-Centric Permission Model for the Internet of Things
39