2015
DOI: 10.1109/tdsc.2014.2320731
|View full text |Cite
|
Sign up to set email alerts
|

Context-Based Access Control Systems for Mobile Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
33
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 74 publications
(33 citation statements)
references
References 32 publications
0
33
0
Order By: Relevance
“…Many different privacy preserving frameworks have been proposed in the literature, which apply techniques like Data Perturbation [5], Cryptography [11], Differential privacy [12], k-anonymity [13], Tessellation [14], Data aggregation [15], Pseudonyms [16] and Access control mechanisms [17]. Table II does a comparison of few such papers on the basis of attacks and threats dealt with, using various privacy techniques.…”
Section: Unlinkabilitymentioning
confidence: 99%
“…Many different privacy preserving frameworks have been proposed in the literature, which apply techniques like Data Perturbation [5], Cryptography [11], Differential privacy [12], k-anonymity [13], Tessellation [14], Data aggregation [15], Pseudonyms [16] and Access control mechanisms [17]. Table II does a comparison of few such papers on the basis of attacks and threats dealt with, using various privacy techniques.…”
Section: Unlinkabilitymentioning
confidence: 99%
“…ICCdetector [8] tries to detect malwares which tries to bypass the detection by inter-communication between components of Android system. In "Context-based Access Control Systems for Mobile Devices" by Bilal Shebaro, Oyindamola Oluwatimi, Alisa Bertino [9],in this they propose a context-based access control mechanism by which privileges can be dynamically granted or revoked to applications based on the specific context of the user by modifying the Android operating systemso that the context based restrictions can be formed and enforced.…”
Section: Related Workmentioning
confidence: 99%
“…al. [1] proposed that the data leakage and privacy compromised in smartphones in the android smartphone we install various applications that share our personal data [1]. That is harmful to us author thought that they also share our location and other thing like our social surfing data.…”
Section: Literature Surveymentioning
confidence: 99%
“…The problem arises when mobile application shared private data and user mobile resources such as GPS that can be share your current location without users permission [1] [3].…”
Section: Introductionmentioning
confidence: 99%