Context aware dynamic permission model: a retrospect of privacy and security in android system

S Kumar, R Shanker, S Verma - 2018 international conference …, 2018 - ieeexplore.ieee.org
Android security has been a topic of concern lately in both academic and industrial research
because of various occurrence of privacy leaks and security breach on these devices. The …

CA‐ARBAC: privacy preserving using context‐aware role‐based access control on Android permission system

J Abdella, M Özuysal, E Tomur - Security and Communication …, 2016 - Wiley Online Library
Existing mobile platforms are based on manual way of granting and revoking permissions to
applications. Once the user grants a given permission to an application, the application can …

Resiliency of mobile OS security for secure personal ubiquitous computing

S Lee, S Lee, T Kang, M Kwon, N Lee… - Personal and Ubiquitous …, 2018 - Springer
As computing devices such as smartphone are used widely, people conduct their
businesses using devices and even enjoy entertainment anywhere. On the other side …

[PDF][PDF] Sandboxing in linux: From smartphone to cloud

I Borate, RK Chavan - International Journal of Computer …, 2016 - researchgate.net
In today's internet world, Malicious and malfunctioning contents from the internet are regular
problems for host systems such as Smartphones, Desktops, Clouds etc. Almost all …

Hardening the Internet of Things: Toward Designing Access Control For Resource Constrained IoT Devices

M Bessler, P Sangster, R Upadrashta… - Proceedings of the 17th …, 2024 - dl.acm.org
A myriad of security and privacy threats have accompanied the rapid proliferation and
widespread adoption of Internet-of-Things (IoT) devices. IoT vendors often justify this …

SAAC: secure android application context a runtime based policy and its architecture

G Averlant, E Alata, M Kaaniche… - 2018 IEEE 17th …, 2018 - ieeexplore.ieee.org
A smartphone runtime environment consists of multiple entities with different goals and
scope. Indeed, critical applications such as banking applications that make contactless …

LCA-ABE: Lightweight context-aware encryption for android applications

S Inshi, R Chowdhury, M Elarbi… - 2020 International …, 2020 - ieeexplore.ieee.org
The evolving of context-aware applications are becoming more readily available as a major
driver of the growth of future connected smart, autonomous environments. However, with the …

An open framework for flexible plug-in privacy mechanisms in crowdsensing applications

M Katsomallos, S Lalis, T Papaioannou… - 2017 IEEE …, 2017 - ieeexplore.ieee.org
Preserving user privacy is crucial for the wide adoption of crowdsensing and participatory
sensing applications that rely on personal devices. Currently, each application comes with …

Role-Based Access Control Models for Android

S Talegaon, R Krishnan - … on Trust, Privacy and Security in …, 2020 - ieeexplore.ieee.org
Android uses runtime permissions to alert users of application resource usage. Only a
limited portion of Android permissions are allowed to be managed by the users. This is …

[PDF][PDF] Survey on Smartphone Virtualization Techniques

SP Kulkarni, S Bojewar - International Research Journal of …, 2015 - academia.edu
This modern era has witnessed a shift of users from desktop computers to smart handheld
devices. Smartphones are used for various purposes such as calling, messaging, sending …