2009
DOI: 10.1007/978-3-642-02444-3_4
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for the Analysis of Access Control Models for Interactive Mobile Devices

Abstract: Abstract. The Java Micro Edition platform (JME), a Java enabled technology, provides the Mobile Information Device Profile (MIDP) standard that facilitates applications development and specifies a security model for the controlled access to sensitive resources of the device. The model builds upon the notion of protection domain, which in turn can be grasped as a set of permissions. An alternative model has been proposed that extends MIDP's by introducing permissions with multiplicities and adding flexibility t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…This section builds upon a number of previously published papers [62,63,64,65]. The rest of the section is organized as follows: Section 2.1 presents the MIDP security model; Section 2.2 overviews the formalization of the MIDP 2.0 security model, presents some of its verified properties, and proposes a methodology to refine the specification and obtain an executable prototype.…”
Section: Document Outlinementioning
confidence: 99%
See 3 more Smart Citations
“…This section builds upon a number of previously published papers [62,63,64,65]. The rest of the section is organized as follows: Section 2.1 presents the MIDP security model; Section 2.2 overviews the formalization of the MIDP 2.0 security model, presents some of its verified properties, and proposes a methodology to refine the specification and obtain an executable prototype.…”
Section: Document Outlinementioning
confidence: 99%
“…In [29], a security model for interactive mobile devices is put forward which can be grasped as an extension of that of MIDP. The work presented in this section, based on [65,1], has focused on developing a formal model for studying, in particular, interactive user querying mechanisms for permission granting for application execution on mobile devices. Like in the MIDP case, the notion of permission is central to this model.…”
Section: A Framework For Defining and Comparing Access Control Policiesmentioning
confidence: 99%
See 2 more Smart Citations