WASET
	@article{(Open Science Index):https://publications.waset.org/pdf/9996778,
	  title     = {Runtime Monitoring Using Policy Based Approach to Control Information Flow for Mobile Apps},
	  author    = {M. Sarrab and  H. Bourdoucen},
	  country	= {},
	  institution	= {},
	  abstract     = {Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as Availability, Integrity and Confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring untrusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during untrusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the runtime of mobile application in response to information flow events.
},
	    journal   = {International Journal of Computer and Information Engineering},
	  volume    = {7},
	  number    = {11},
	  year      = {2013},
	  pages     = {1444 - 1451},
	  ee        = {https://publications.waset.org/pdf/9996778},
	  url   	= {https://publications.waset.org/vol/83},
	  bibsource = {https://publications.waset.org/},
	  issn  	= {eISSN: 1307-6892},
	  publisher = {World Academy of Science, Engineering and Technology},
	  index 	= {Open Science Index 83, 2013},
	}