Login / Signup
Evaluation of mHealth Applications Security Based on Application Permissions.
Evgenii Pustozerov
Ute von Jan
Urs-Vito Albrecht
Published in:
ICIMTH (2016)
Keyphrases
</>
access control
data sets
intrusion detection
evaluation criteria
evaluation model
computer security
real time
decision support
security policies
statistical databases
security mechanisms
security model
network connection