Permission-based security in Android application - From policy expert to end user

Ajay Kumar Jha, Seungmin Lee, Woo Jin Lee

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Though filtering of malicious applications is performed at Play Store, some malicious applications escape the filtering process. Thus, it becomes necessary to take strong security measures at other levels. Security in Android can be enforced at system and application levels. At system level Android uses sandboxing technique while at application level it uses permission. In this paper we briefly discuss the permission-based security implemented in Android through three different perspectives - policy expert, developer, and end user.

Original languageEnglish
Title of host publicationProceeding of the 2015 Research in Adaptive and Convergent Systems, RACS 2015
PublisherAssociation for Computing Machinery, Inc
Pages319-320
Number of pages2
ISBN (Electronic)9781450337380
DOIs
StatePublished - 9 Oct 2015
EventResearch in Adaptive and Convergent Systems, RACS 2015 - Prague, Czech Republic
Duration: 9 Oct 201512 Oct 2015

Publication series

NameProceeding of the 2015 Research in Adaptive and Convergent Systems, RACS 2015

Conference

ConferenceResearch in Adaptive and Convergent Systems, RACS 2015
Country/TerritoryCzech Republic
CityPrague
Period9/10/1512/10/15

Keywords

  • Android
  • Permission
  • Policy
  • Privacy
  • Security

Fingerprint

Dive into the research topics of 'Permission-based security in Android application - From policy expert to end user'. Together they form a unique fingerprint.

Cite this