A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Bhardwaj, Akshay
- Granular Per(M)issions: Questions Unanswered
Authors
1 Department of Computer Science, Himachal Pradesh University, Himachal Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 32 (2016), Pagination:Abstract
Objectives: In android users do not understand the permissions structure and how apps utilize these permissions. Methods/Statistical Analysis: Study of App Ops system in android and finding out ways to check what permission android apps are using and also to check and derive various algorithms to see what levels of access can be granted to permissions. Also to see if an application can be developed so that the user could know what permissions app is using and whether they are required or not? Findings: After proposing four algorithms and trying to classify the level of protection access to permissions we have found that this classification yields desired results. The client can know what permissions are being requested by which apps and can therefore be enlightened to its hazards and security risks. Also although this approach is similar to what Google has done with the Marshmallow version howsoever it suffers from shortcomings and is not yet, a complete solution. Thus, our results will only substantiate and help in the creation of a more robust and secure android version. Whether this much power should be given to the naïve user, however is a question that needs some thought. Application/Improvements: Our algorithms can be applied to newer versions of android to make it more secure and ensure user privacy.Keywords
Algorithms, Android, Granular, Permissions, Privacy, Security.- Android vs. IOS: An Architectural Perspective
Authors
Source
International Journal of Innovative Research and Development, Vol 3, No 1 (2014), Pagination:Abstract
Android is not only a mobile operating system that uses a modified version of the Linux kernel, but also a software stack for mobile devices that includes an operating system, middleware and key applications. iPhone operating system is a mobile operating system developed and marketed by Apple Inc. It is the default operating system for the iPhone, the iTouch and the iPad. The iPhone OS was derived from Mac OX X and the version history of iPhone OS began at June 29, 2007 with the release of the iPhone. In these preceding years, the entire world has witnessed the rise of these two platforms which is comparable to the 1980’s and 90’s when linux and windows emerged as the two poles of the computer industry.This research paper will be extremely helpful to have a comparative overview between these two OS’s and also sheds light on the security aspect of these two largely vulnerable operating systems.