Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "d8f96d02-3d75-4a40-af16-b45236c50291"}, "_deposit": {"id": "3543", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3543"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3543", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Context-Related Security Control Mechanisms on Android Platform", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The revolution of mobile phones era hasbrought the innovative smartphones technology. As aresult, research addressing information access insmartphones environment has proliferated. Theimportant feature in security of smartphones is torestrict the behavior of users using applications andservices. In the meantime, the existing securitymechanism on Android mostly holds a coarse-grainedand incomplete security model. To enhance this intofine-grained manner, it is practical to use contextrelatedinformation to specify precisely whatresources and services an application should beauthorized access to. While the concept of contextrelatedsecurity mechanism is not new, challenges arefacing to adopt this technology to its full potential. Inthis paper, we attempt to review the existing finegrainedcontext-aware models. These approachesdiffer regarding of how control is initiated e.g. viaSMS messages, how context is activated e.g. manuallyor automatically etc. From this study, we intend tobuild simpler as well as clear security controlmechanism based on user context such as accesspatterns of resource or working set. We also aim toapply classification technique in the decision makingprocess for access control without user intervention.This paper is initial endeavor of our researchproposal."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-25"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (82).pdf", "filesize": [{"value": "20 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 20000.0, "url": {"url": "https://meral.edu.mm/record/3543/files/psc2010paper (82).pdf"}, "version_id": "be194a3b-2cdb-4261-bad3-c3a2c633ee16"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Yee, Thiri The` Wut"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1283"}, "item_title": "Context-Related Security Control Mechanisms on Android Platform", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003543", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-25"}, "publish_date": "2019-07-25", "publish_status": "0", "recid": "3543", "relation": {}, "relation_version_is_last": true, "title": ["Context-Related Security Control Mechanisms on Android Platform"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Context-Related Security Control Mechanisms on Android Platform

http://hdl.handle.net/20.500.12678/0000003543
http://hdl.handle.net/20.500.12678/0000003543
858c2bd5-216f-4b16-830a-ab24721876ed
d8f96d02-3d75-4a40-af16-b45236c50291
None
Preview
Name / File License Actions
psc2010paper psc2010paper (82).pdf (20 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:07:30.596201
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL