Control operation flow for mobile access control with the use of MABAC model

5Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As mobile devices tend to become more and more essential part of everyday life the significance of security of applications designed for the use on such devices is constantly growing. Most of the mobile platform providers assure sophisticated security mechanisms which aim to prevent threatening applications to be published as well as they make certain security features available to use. Nevertheless, the design and implementation of these features leaves a vast area where potential enhancements can be brought to life and mistakes avoided. In order to address this field of mobile application development MABAC, an access control model was introduced which aims to characterize the access control flow specific for mobile systems. The paper describes the crucial processes connected with the MABAC model and brings closer the details of the control flow in the mobile application designed according to the rules of the model.

Cite

CITATION STYLE

APA

Majchrzycka, A., & Poniszewska-Maranda, A. (2018). Control operation flow for mobile access control with the use of MABAC model. In Studies in Computational Intelligence (Vol. 733, pp. 179–192). Springer Verlag. https://doi.org/10.1007/978-3-319-65208-5_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free