Managing Connection Based Access Control Systems on the other hand Mobile Devices

Authors

  • S Venkatesan PG and Research Department of Computer Science, Maruthupandiyar College, Thanjavur
  • K Renuka Devi PG and Research Department of Computer Science, Maruthupandiyar College, Thanjavur

Keywords:

Context-Based Access Control, Smartphone Devices, Security And Privacy, Policies, Mobile Applications

Abstract

An android is a name given to a versatile working structure made by Google. A working structure is programming that acts as an interface also, manages PC equipment also, programming resources. In any other working system, there is a issue of malevolent programming on the other hand noxious contents attempting to wreak havoc. A noxious programming is any programming that is utilized on the other hand on the other hand can disrupt PC operation also, gather access to private structures .Android applications will frequently have access to private also, grouped resources also, data in the client’s device. There is high degree of conceivable misuse of these resources. We can take an illustration of an application utilizing a feature camera to document the on-going exercises of an organization. Android customers do have a certain sum of control over the application limits also, limits after installing it based on client’s connection. In our paper, we propose another way where system managers can control what applications are granted access on the other hand revoked.

References

Corradi, A. ; DEIS, Bologna Univ., Italy ; Montanari, R. ; Tibaldi, D., “Context-based access control for ubiquitous service provisioning”, Published in: Computer Software and Applications Conference, 2004. COMPSAC 2004. Proceedings of the 28th Annual International Date of Conference: 28-30 Sept. 2004 Page(s): 444 - 451 vol.1.

Teslya, N. ; SPIIRAS, St. Petersburg, Russia ; Kashevnik, A. ; Pashkin, M., “Context-based access control for ridesharing service”, Published in: Open Innovations Association (FRUCT), 2013 14th Conference of Date of Conference: 11-15 Nov. 2013 Page(s): 156 – 163.

Yao Han-bing ; Coll. of Comput., Huazhong Univ. of Sci. & Technol., Wuhan ; Hu He-ping ; Lu Zheng-ding ; Li Rui-xuan, “Dynamic Role and Context-Based Access Control for Grid Applications”, Published in: TENCON 2005 2005 IEEE Region 10 Date of Conference: 21-24 Nov. 2005 Page(s): 1 – 7.

Smirnov, A. ; Lab. of Comput. Aided Integrated Syst., SPIIRAS, St. Petersburg, Russia ; Kashevnik, A. ; Shilov, N. ; Teslya, N., “Context-based access control model for smart space”, Published in: Cyber Conflict (CyCon), 2013 5th International Conference on Date of Conference: 4-7 June 2013 Page(s): 1 – 15.

Jadliwala, M. ; Wichita State Univ., Wichita, KS, USA ; Maiti, A. ; Namboodiri, V., “Social Puzzles: Context-Based Access Control in Online Social Networks”, Published in:Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International Conference on Date of Conference: 23-26 June 2014 Page(s): 299 – 310.

De Dominicis, C.M. ; Dept. of Inf. Eng., Univ. of Brescia, Brescia, Italy ; Depari, A. ; Flammini, A. ; Rinaldi, S., “Acquisition and elaboration of cardiac signal in android Smartphone devices”, Published in: Sensors Applications Symposium (SAS), 2014 IEEE Date of Conference: 18-20 Feb. 2014 Page(s): 83 – 88.

Dhobale Dhanashri, D. ; Dept. of Inf. Tech., P.V.P.I.T. Budhgaon, Sangli, India ; Patil Babaso, S. ; Patil Shubhangi, H., “MMS steganography for Smartphone devices”, Published in: Computer Engineering and Technology (ICCET), 2010 2nd International Conference on (Volume:4 ) Date of Conference: 16-18 April 2010 Page(s): V4-513 - V4-516.

Pournaghshband, V.; Comput. Sci. Dept., California State Univ., Northridge, CA, USA ; Meyer, D. ; Holyland, M. ; Sarrafzadeh, M., “Adrasteia: A Smartphone App for Securing Legacy Mobile Medical Devices”, Published in: Computational Science and Engineering (CSE), 2014 IEEE 17th International Conference on Date of Conference: 19-21 Dec. 2014 Page(s): 758 – 763.

Gupta, M. ; Civil, Environ. & Geomatic Eng., Univ. Coll. London, London, UK ; Holloway, C. ; Heravi, B.M. ; Hailes, S., “A comparison between smartphone sensors and bespoke sensor devices for wheelchair accessibility studies”, Published in: Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2015 IEEE Tenth International Conference on Date of Conference: 7-9 April 2015 Page(s): 1 – 6.

Downloads

Published

2025-11-10

How to Cite

[1]
S. Venkatesan and K. Renuka Devi, “Managing Connection Based Access Control Systems on the other hand Mobile Devices”, Int. J. Comp. Sci. Eng., vol. 3, no. 9, pp. 298–301, Nov. 2025.