Open Access   Article Go Back

Managing Connection Based Access Control Systems on the other hand Mobile Devices

S.Venkatesan 1 , K.Renuka Devi2

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-9 , Page no. 298-301, Sep-2015

Online published on Oct 01, 2015

Copyright © S.Venkatesan , K.Renuka Devi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S.Venkatesan , K.Renuka Devi, “Managing Connection Based Access Control Systems on the other hand Mobile Devices,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.298-301, 2015.

MLA Style Citation: S.Venkatesan , K.Renuka Devi "Managing Connection Based Access Control Systems on the other hand Mobile Devices." International Journal of Computer Sciences and Engineering 3.9 (2015): 298-301.

APA Style Citation: S.Venkatesan , K.Renuka Devi, (2015). Managing Connection Based Access Control Systems on the other hand Mobile Devices. International Journal of Computer Sciences and Engineering, 3(9), 298-301.

BibTex Style Citation:
@article{Devi_2015,
author = {S.Venkatesan , K.Renuka Devi},
title = {Managing Connection Based Access Control Systems on the other hand Mobile Devices},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {298-301},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=688},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=688
TI - Managing Connection Based Access Control Systems on the other hand Mobile Devices
T2 - International Journal of Computer Sciences and Engineering
AU - S.Venkatesan , K.Renuka Devi
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 298-301
IS - 9
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2338 2244 downloads 2360 downloads
  
  
           

Abstract

An android is a name given to a versatile working structure made by Google. A working structure is programming that acts as an interface also, manages PC equipment also, programming resources. In any other working system, there is a issue of malevolent programming on the other hand noxious contents attempting to wreak havoc. A noxious programming is any programming that is utilized on the other hand on the other hand can disrupt PC operation also, gather access to private structures .Android applications will frequently have access to private also, grouped resources also, data in the client’s device. There is high degree of conceivable misuse of these resources. We can take an illustration of an application utilizing a feature camera to document the on-going exercises of an organization. Android customers do have a certain sum of control over the application limits also, limits after installing it based on client’s connection. In our paper, we propose another way where system managers can control what applications are granted access on the other hand revoked.

Key-Words / Index Term

Context-Based Access Control, Smartphone Devices, Security And Privacy, Policies, Mobile Applications

References

[1] Corradi, A. ; DEIS, Bologna Univ., Italy ; Montanari, R. ; Tibaldi, D., “Context-based access control for ubiquitous service provisioning”, Published in: Computer Software and Applications Conference, 2004. COMPSAC 2004. Proceedings of the 28th Annual International Date of Conference: 28-30 Sept. 2004 Page(s): 444 - 451 vol.1.
[2] Teslya, N. ; SPIIRAS, St. Petersburg, Russia ; Kashevnik, A. ; Pashkin, M., “Context-based access control for ridesharing service”, Published in: Open Innovations Association (FRUCT), 2013 14th Conference of Date of Conference: 11-15 Nov. 2013 Page(s): 156 – 163.
[3] Yao Han-bing ; Coll. of Comput., Huazhong Univ. of Sci. & Technol., Wuhan ; Hu He-ping ; Lu Zheng-ding ; Li Rui-xuan, “Dynamic Role and Context-Based Access Control for Grid Applications”, Published in: TENCON 2005 2005 IEEE Region 10 Date of Conference: 21-24 Nov. 2005 Page(s): 1 – 7.
[4] Smirnov, A. ; Lab. of Comput. Aided Integrated Syst., SPIIRAS, St. Petersburg, Russia ; Kashevnik, A. ; Shilov, N. ; Teslya, N., “Context-based access control model for smart space”, Published in: Cyber Conflict (CyCon), 2013 5th International Conference on Date of Conference: 4-7 June 2013 Page(s): 1 – 15.
[5] Jadliwala, M. ; Wichita State Univ., Wichita, KS, USA ; Maiti, A. ; Namboodiri, V., “Social Puzzles: Context-Based Access Control in Online Social Networks”, Published in:Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International Conference on Date of Conference: 23-26 June 2014 Page(s): 299 – 310.
[6] De Dominicis, C.M. ; Dept. of Inf. Eng., Univ. of Brescia, Brescia, Italy ; Depari, A. ; Flammini, A. ; Rinaldi, S., “Acquisition and elaboration of cardiac signal in android Smartphone devices”, Published in: Sensors Applications Symposium (SAS), 2014 IEEE Date of Conference: 18-20 Feb. 2014 Page(s): 83 – 88.
[7] Dhobale Dhanashri, D. ; Dept. of Inf. Tech., P.V.P.I.T. Budhgaon, Sangli, India ; Patil Babaso, S. ; Patil Shubhangi, H., “MMS steganography for Smartphone devices”, Published in: Computer Engineering and Technology (ICCET), 2010 2nd International Conference on (Volume:4 ) Date of Conference: 16-18 April 2010 Page(s): V4-513 - V4-516.
[8] Pournaghshband, V.; Comput. Sci. Dept., California State Univ., Northridge, CA, USA ; Meyer, D. ; Holyland, M. ; Sarrafzadeh, M., “Adrasteia: A Smartphone App for Securing Legacy Mobile Medical Devices”, Published in: Computational Science and Engineering (CSE), 2014 IEEE 17th International Conference on Date of Conference: 19-21 Dec. 2014 Page(s): 758 – 763.
[9] Gupta, M. ; Civil, Environ. & Geomatic Eng., Univ. Coll. London, London, UK ; Holloway, C. ; Heravi, B.M. ; Hailes, S., “A comparison between smartphone sensors and bespoke sensor devices for wheelchair accessibility studies”, Published in: Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2015 IEEE Tenth International Conference on Date of Conference: 7-9 April 2015 Page(s): 1 – 6.