Analysis of the Impact of Permissions on the Vulnerability of Mobile Applications.
Gouayon KoalaDidier BassoléAminata Zerbo/SabanéTegawendé F. BissyandéOumarou SiéPublished in: AFRICOMM (2019)
Keyphrases
- mobile applications
- access control
- mobile devices
- mobile phone
- mobile users
- user experience
- m learning
- smart phones
- mobile environments
- context aware
- battery life
- interaction design
- role based access control
- mobile platform
- end users
- mobile services
- location based services
- wifi
- desktop computers
- mobile platforms
- wireless devices
- wireless technologies