Abdella et al., 2016 - Google Patents
CA‐ARBAC: privacy preserving using context‐aware role‐based access control on Android permission systemAbdella et al., 2016
View PDF- Document ID
- 4050732746645193573
- Author
- Abdella J
- Özuysal M
- Tomur E
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
Existing mobile platforms are based on manual way of granting and revoking permissions to applications. Once the user grants a given permission to an application, the application can use it without limit, unless the user manually revokes the permission. This has become the …
- 239000000306 component 0 description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9792459B2 (en) | Flexible policy arbitration control suite | |
US9992201B2 (en) | Threat-aware provisioning and governance | |
KR102403480B1 (en) | Device policy manager | |
US9047463B2 (en) | Method and system for protecting data flow at a mobile device | |
Khan et al. | How secure is your smartphone: An analysis of smartphone security mechanisms | |
Kumar et al. | Context aware dynamic permission model: a retrospect of privacy and security in android system | |
EP2939390B1 (en) | Processing device and method of operation thereof | |
Banuri et al. | An Android runtime security policy enforcement framework | |
KR20150052010A (en) | Network system for implementing a cloud platform | |
Abdella et al. | CA‐ARBAC: privacy preserving using context‐aware role‐based access control on Android permission system | |
Neisse et al. | A privacy enforcing framework for Android applications | |
Thanigaivelan et al. | CoDRA: Context-based dynamically reconfigurable access control system for android | |
Arena et al. | SecureDroid: An Android security framework extension for context-aware policy enforcement | |
Schreckling et al. | Constroid: data-centric access control for android | |
WO2022240563A1 (en) | Abnormally permissive role definition detection systems | |
Feth et al. | Context-aware, data-driven policy enforcement for smart mobile devices in business environments | |
Oluwatimi et al. | An application restriction system for bring-your-own-device scenarios | |
Gupta et al. | A risk-driven model to minimize the effects of human factors on smart devices | |
Lee et al. | Privacy preserving collaboration in bring-your-own-apps | |
Aldoseri et al. | A tale of four gates: Privilege escalation and permission bypasses on android through app components | |
Ratazzi | Understanding and improving security of the Android operating system | |
Marchiori et al. | Android private compute core architecture | |
WO2015102714A2 (en) | Polymorphic computing architectures | |
EP2840755A1 (en) | Processing device and method of operation thereof | |
Oluwafemi et al. | Per-app profiles with appfork: The security of two phones with the convenience of one |