[go: up one dir, main page]

Abdella et al., 2016 - Google Patents

CA‐ARBAC: privacy preserving using context‐aware role‐based access control on Android permission system

Abdella et al., 2016

View PDF
Document ID
4050732746645193573
Author
Abdella J
Özuysal M
Tomur E
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

Existing mobile platforms are based on manual way of granting and revoking permissions to applications. Once the user grants a given permission to an application, the application can use it without limit, unless the user manually revokes the permission. This has become the …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
US9792459B2 (en) Flexible policy arbitration control suite
US9992201B2 (en) Threat-aware provisioning and governance
KR102403480B1 (en) Device policy manager
US9047463B2 (en) Method and system for protecting data flow at a mobile device
Khan et al. How secure is your smartphone: An analysis of smartphone security mechanisms
Kumar et al. Context aware dynamic permission model: a retrospect of privacy and security in android system
EP2939390B1 (en) Processing device and method of operation thereof
Banuri et al. An Android runtime security policy enforcement framework
KR20150052010A (en) Network system for implementing a cloud platform
Abdella et al. CA‐ARBAC: privacy preserving using context‐aware role‐based access control on Android permission system
Neisse et al. A privacy enforcing framework for Android applications
Thanigaivelan et al. CoDRA: Context-based dynamically reconfigurable access control system for android
Arena et al. SecureDroid: An Android security framework extension for context-aware policy enforcement
Schreckling et al. Constroid: data-centric access control for android
WO2022240563A1 (en) Abnormally permissive role definition detection systems
Feth et al. Context-aware, data-driven policy enforcement for smart mobile devices in business environments
Oluwatimi et al. An application restriction system for bring-your-own-device scenarios
Gupta et al. A risk-driven model to minimize the effects of human factors on smart devices
Lee et al. Privacy preserving collaboration in bring-your-own-apps
Aldoseri et al. A tale of four gates: Privilege escalation and permission bypasses on android through app components
Ratazzi Understanding and improving security of the Android operating system
Marchiori et al. Android private compute core architecture
WO2015102714A2 (en) Polymorphic computing architectures
EP2840755A1 (en) Processing device and method of operation thereof
Oluwafemi et al. Per-app profiles with appfork: The security of two phones with the convenience of one