Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Choi, Junho Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 2 of 2 reviews    
  Personal information leakage detection method using the inference-based access control model on the Android platform
Choi J., Sung W., Choi C., Kim P. Pervasive and Mobile Computing 24(C): 138-149, 2015.  Type: Article

The Android platform has led to smartphone users being vulnerable to apps embedded with malicious code. The authors of this paper have developed an inference-based access control model for detecting the leakage of internal private info...
...
Mar 25 2016  
  Ontology-based access control model for security policy reasoning in cloud computing
Choi C., Choi J., Kim P. The Journal of Supercomputing 67(3): 711-722, 2014.  Type: Article

The title of this paper indicates that it is about an access control model geared toward cloud computing. However, it is not indicated what resources of the cloud are being controlled. The resources at the infrastructure as a service (...
...
Jan 12 2015  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy