Preventing Information Leakage in Mobile Applications with Object-Oriented Access Control Lists and Security Monitor Encapsulation.
Shiow-Yang WuShih-Chien ChouPublished in: J. Inf. Sci. Eng. (2009)
Keyphrases
- access control
- mobile applications
- information leakage
- object oriented
- security policies
- data security
- mobile devices
- mobile phone
- personal information
- security mechanisms
- security requirements
- dynamic access control
- context aware
- role based access control
- security model
- user experience
- sensitive information
- access control policies
- access control models
- data model
- location based services
- relational databases
- rbac model
- database security
- access control mechanism
- end users
- database applications
- database design
- personal data
- distributed data