2017
DOI: 10.1002/cpe.4180
|View full text |Cite
|
Sign up to set email alerts
|

Towards a multilayered permission‐based access control for extending Android security

Abstract: This paper discusses security issues on the user equipment, which is the "last mile" of social networks. One of the main Achilles' heel of social networks is not the organization of networks themselves, but the user devices, typically Android ones. The existing system of privileges makes it easy to infiltrate the network via applications installed on users' devices. Conventional signature-based and static analysis methods are vulnerable. Access to privacy-and security-relevant parts of the application programm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 36 publications
0
3
0
Order By: Relevance
“…The author also proposed an efficient policy language that is specific to the middleware semantics of Android. Another security architecture that provides MAC is proposed by R Chang et al, 20 which is designed based on the ARM TrustZone security extension mechanism and provides permission-based MAC on Android middleware, Linux kernel and hardware layers. Samlley proposed the Security Enhanced Android (SEAndroid) 21 that also implemented the MAC model in Android.…”
Section: Related Workmentioning
confidence: 99%
“…The author also proposed an efficient policy language that is specific to the middleware semantics of Android. Another security architecture that provides MAC is proposed by R Chang et al, 20 which is designed based on the ARM TrustZone security extension mechanism and provides permission-based MAC on Android middleware, Linux kernel and hardware layers. Samlley proposed the Security Enhanced Android (SEAndroid) 21 that also implemented the MAC model in Android.…”
Section: Related Workmentioning
confidence: 99%
“…This special issue would not be complete without covering the security of mobile platforms and the technique of data forensics. Chang et al presented a multilayer permission‐based access control scheme for Android by using the ARM TrustZone security extension mechanism. In contrast to previous work, the proposed security architecture provides a permission‐based mandatory access control on Android middleware, Linux kernel, and hardware layers.…”
Section: Themes Of This Special Issuementioning
confidence: 99%
“…The access control models can be divided into 5 categories: the discretionary access control (DAC) [5], the mandatory access control (MAC) [6], the role-based access control (RBAC) [7][8][9], the attribute-based access control (ABAC) [10], the policy-based access control (PBAC) [11,12]. Various data security algorithms are used to improve the security of the access control model.…”
Section: Introductionmentioning
confidence: 99%