2020
DOI: 10.3233/jcs-191350
|View full text |Cite
|
Sign up to set email alerts
|

A multi-party, fine-grained permission and policy enforcement framework for hybrid mobile applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 48 publications
0
2
0
Order By: Relevance
“…Table 3 represents the results of the predicted vulnerable components of classes. The results have been characterized into the following five sections: type of prediction features used, the foundation of the vulnerability data, the kind of prediction technique, the applications used for the validation, and the available performance meters [19], [42]. For the training data collection, we use the 0.7.6 variant of the FBReader and the SVM vector machine to construct the model for predicting the vulnerable classes and components.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Table 3 represents the results of the predicted vulnerable components of classes. The results have been characterized into the following five sections: type of prediction features used, the foundation of the vulnerability data, the kind of prediction technique, the applications used for the validation, and the available performance meters [19], [42]. For the training data collection, we use the 0.7.6 variant of the FBReader and the SVM vector machine to construct the model for predicting the vulnerable classes and components.…”
Section: Resultsmentioning
confidence: 99%
“…When an API invocation is received it will be tested by the stateful policies within a policy manager acting as a monitor. If the API invocation is permitted, then access will be granted as elucidated in Figure 7 [42]. The HybridGuard framework can be useful for developers in the creation of access control policies and metrics to assess security by recording instances of unauthorized access, what data was trying to be accessed, and data exposure by authorized API invocations.…”
Section: Metrics For Access Control Securitymentioning
confidence: 99%