Please use this identifier to cite or link to this item:
https://www.um.edu.mt/library/oar/handle/123456789/23195
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chircop, Luke | - |
dc.contributor.author | Colombo, Christian | - |
dc.contributor.author | Pace, Gordon J. | - |
dc.date.accessioned | 2017-10-31T11:24:06Z | - |
dc.date.available | 2017-10-31T11:24:06Z | - |
dc.date.issued | 2014-11 | - |
dc.identifier.citation | Chircop, L., Colombo, C., & Pace, G. J. (2014). Improving Android security through real-time policy enforcement. Computer Science Annual Workshop CSAW’14, Msida. 1-3. | en_GB |
dc.identifier.uri | https://www.um.edu.mt/library/oar//handle/123456789/23195 | - |
dc.description.abstract | The use of the Android operating system has become a very popular option with a vast variety of mobile devices. This popularity means that companies and other users are more likely to consider using android devices. Naturally there will be users and companies concerned with how their Android devices are used. Therefore, some sort of device management is required. Let us consider a coffee distribution company that has employees visiting its customers to showcase new products and take orders. Such a company would need to provide its employees with portable devices containing sensitive data about their products and customers. Therefore, the company would want to limit access to such data to only authorized applications or users. It could also want to disable the android market or not allow untrusted applications from running on the mobile device. Another possible scenario could be that of having parents concerned with how their children use their mobile devices. It is well known that children love to play games, therefore a parent might want to control the amount of hours per day that they could spend playing on their mobile device. They could also want to make sure that the browsers that their children use, filter out bad websites. Parents could also want to control how many messages and phone calls their children make. | en_GB |
dc.language.iso | en | en_GB |
dc.publisher | University of Malta. Faculty of ICT | en_GB |
dc.rights | info:eu-repo/semantics/openAccess | en_GB |
dc.subject | Smartphones -- Security measures | en_GB |
dc.subject | Mobile computing -- Security measures | en_GB |
dc.subject | Real-time data processing | en_GB |
dc.title | Improving Android security through real-time policy enforcement | en_GB |
dc.type | conferenceObject | en_GB |
dc.rights.holder | The copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder. | en_GB |
dc.bibliographicCitation.conferencename | Computer Science Annual Workshop CSAW’14 | en_GB |
dc.bibliographicCitation.conferenceplace | Msida, Malta, 6-7/11/2014 | en_GB |
dc.description.reviewed | peer-reviewed | en_GB |
Appears in Collections: | Scholarly Works - FacICTCS |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Proceedings of CSAW’14 - A15.pdf | 190.82 kB | Adobe PDF | View/Open |
Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.