Abusing iOS Permissions: A Security Perspective.
Fares AlanazyRamzi SaifanMousa T. Al-AkhrasSamer AtawnehAdeeb AlhomoudPublished in: SSD (2024)
Keyphrases
- access control
- security model
- role based access control
- security policies
- security issues
- information security
- data security
- security mechanisms
- security management
- intrusion detection
- security systems
- security requirements
- security threats
- security problems
- security analysis
- computer security
- network security
- java card
- functional requirements
- security protocols
- key management
- database
- statistical databases
- design principles
- third party
- viewpoint
- web services
- data mining