Security and Privacy Enhancement Framework for Mobile Devices using Active Authentication
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2018, Vol 2, Issue 3
Abstract
The techniques we used to develop and to ensure the separation of enterprise content and personal data on an end-users device. Although the enterprise manages the environment in which work-related activities are conducted, referred to as a work persons third-party applications installed on the mobile devices may make the enterprise content vulnerable to misuse or exfiltration.An application restriction policy is configured through our Application Restriction Manager (ARM) Policy Manager that allows one to set different restrictions for each installed application. Our approach, that we refer to as DroidARM, focuses on post-installation application restriction policies. Such policies dynamically restrict the capabilities of mobile applications at run-time. An application restriction policy is configured through our Application Restriction Manager (ARM) Policy Manager that allows one to set different restrictions for each installed application. Adhering to the policy, our ARM system limits the capabilities of an application by restricting access to data and system resources contained within the work persona. Data shadowing is a data and system resource protection technique we have chosen to leverage. We have implemented DroidARM and integrated it into the Android operating system. Our experimental results show that our approach is efficient and effective. S Udith Narayanan | P Vignesh | T Manigandan"Security and Privacy Enhancement Framework for Mobile Devices using Active Authentication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11175.pdf http://www.ijtsrd.com/engineering/computer-engineering/11175/security-and-privacy-enhancement-framework-for-mobile-devices-using-active-authentication/s-udith-narayanan
Analytical Study between Construction Material Wastage and Time Overrun
It is well known that most construction projects in Pune Strip exposed to time overruns and material wastage or both. This phenomenon may affect the progress of construction industry in Pune Strip as well as may expose m...
On the issue of improving the reliability of consumer protection in unbalanced modes of low-voltage networks
Article is devoted to the research of reliability of systems of power supply. Results of introduction of the latest technical solutions realized in automatic Master pact breakers of the Schneider Electric company are giv...
Growth of Foreign Bank in India
Finance and banking is the life blood of trade, commerce and industry. Now "“a-days, banking sector acts as the backbone of modern business.In current faster lifestyle peoples may not do proper transitions without develo...
Compensation of Sag and Swell Voltage by using Dynamic Voltage Restorer
The increase use of modern sensitive and sophisticated loads connected to distribution system causes various problems to the system. The major problems are voltage sag and swell, there is need to compensate it .Today mos...
Memory Management in Operating System
In the recent era of computing, applications an operating system cannot survive without efficient memory management, especially if an application has to be under Surve load for an undefined long time. Resources must be u...