An android is a name given to a mobile operating system made by Google. An operating system is software that acts as an interface and manages computer hardware and software resources. In any other operating system, there is a problem of malevolent software or malicious contents trying to wreck havoc. A malicious software is any software that is used for or can disrupt computer operation and gather access to private systems 1.Android applications will frequently have access to private and confidential resources and information in the user's device. There is high degree of possible exploitation of these resources. We can take an example of an application using a video camera to document the on-going activities of an organization. Android users do have a certain amount of control over the application capacities and capabilities after installing it based on user's context 2. In our paper, we propose another way where network managers can control what applications are granted access or revoked
%0 Journal Article
%1 Rajan_2015
%A Rajan, Nisha
%A R, Nalini Preetha
%A Vijai,
%D 2015
%I Auricle Technologies, Pvt., Ltd.
%J International Journal on Recent and Innovation Trends in Computing and Communication
%K access android context control
%N 3
%P 1174--1177
%R 10.17762/ijritcc2321-8169.150362
%T Managing Context Based Access Control Systems for Mobile Devices
%U http://dx.doi.org/10.17762/ijritcc2321-8169.150362
%V 3
%X An android is a name given to a mobile operating system made by Google. An operating system is software that acts as an interface and manages computer hardware and software resources. In any other operating system, there is a problem of malevolent software or malicious contents trying to wreck havoc. A malicious software is any software that is used for or can disrupt computer operation and gather access to private systems 1.Android applications will frequently have access to private and confidential resources and information in the user's device. There is high degree of possible exploitation of these resources. We can take an example of an application using a video camera to document the on-going activities of an organization. Android users do have a certain amount of control over the application capacities and capabilities after installing it based on user's context 2. In our paper, we propose another way where network managers can control what applications are granted access or revoked
@article{Rajan_2015,
abstract = {An android is a name given to a mobile operating system made by Google. An operating system is software that acts as an interface and manages computer hardware and software resources. In any other operating system, there is a problem of malevolent software or malicious contents trying to wreck havoc. A malicious software is any software that is used for or can disrupt computer operation and gather access to private systems [1].Android applications will frequently have access to private and confidential resources and information in the user's device. There is high degree of possible exploitation of these resources. We can take an example of an application using a video camera to document the on-going activities of an organization. Android users do have a certain amount of control over the application capacities and capabilities after installing it based on user's context [2]. In our paper, we propose another way where network managers can control what applications are granted access or revoked},
added-at = {2015-08-11T06:48:12.000+0200},
author = {Rajan, Nisha and R, Nalini Preetha and Vijai},
biburl = {https://www.bibsonomy.org/bibtex/2a2b08814dbddfcb8b113fb439a382bf8/ijritcc},
doi = {10.17762/ijritcc2321-8169.150362},
interhash = {38695e70c142c5cd6f8e8ff4cc035af4},
intrahash = {a2b08814dbddfcb8b113fb439a382bf8},
journal = {International Journal on Recent and Innovation Trends in Computing and Communication},
keywords = {access android context control},
month = {march},
number = 3,
pages = {1174--1177},
publisher = {Auricle Technologies, Pvt., Ltd.},
timestamp = {2015-08-11T06:48:12.000+0200},
title = {Managing Context Based Access Control Systems for Mobile Devices},
url = {http://dx.doi.org/10.17762/ijritcc2321-8169.150362},
volume = 3,
year = 2015
}