Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/1054
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jithu Philip, Merin Raju | - |
dc.date.accessioned | 2023-09-11T10:33:09Z | - |
dc.date.available | 2023-09-11T10:33:09Z | - |
dc.date.issued | 2019 | - |
dc.identifier.uri | http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/1054 | - |
dc.description.abstract | The use of mobile operating systems is rapidly increasing as the number of smartphone users is increasing day by day. iOS is one of the most popular and widely used mobile operating systems in the world. This document describes an overview about the security features of iOS in its low-level system framework and in its user-level applications framework. The document discusses processes like how security is implemented in the core components of the system, how data protection and encryption is achieved, and how applications are secured by sandboxing. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Indian Journal of Computer Science | en_US |
dc.subject | Application security | en_US |
dc.subject | Data security | en_US |
dc.subject | Encryption | en_US |
dc.subject | Apple | en_US |
dc.subject | iOS | en_US |
dc.subject | Operating systems | en_US |
dc.subject | System security | en_US |
dc.title | An Overview About the Security Architecture of the Mobile | en_US |
dc.type | Article | en_US |
Appears in Collections: | Article Archives |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
An Overview About the Security Architecture of the Mobile Operating System.pdf Restricted Access | An Overview About the Security Architecture of the Mobile | 354.2 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.