Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/1066
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jithu Philip, Merin Raju | - |
dc.date.accessioned | 2023-09-12T09:57:01Z | - |
dc.date.available | 2023-09-12T09:57:01Z | - |
dc.date.issued | 2019 | - |
dc.identifier.uri | http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/1066 | - |
dc.description.abstract | Android and iOS are the most popular and commonly used mobile operating systems in the world. The increase in the usage share of these along with the extensive use of internet in smartphones and tablets lead to security threats being spread more frequently than expected for both. This document describes one of the security mechanisms used from earlier days of operating systems called Sandbox or Application Sandbox. The document also specifies details regarding how Application Sandbox is implemented in Android and iOS along with the common causes for malware attacks on both and an analysis about the common vulnerabilities and exposures reported on both the platforms. The major issue that the document focuses on is to make the users aware of the need to make use of protection mechanisms like Sandbox effectively to reduce the number of malware attacks. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Indian Journal of Computer Science | en_US |
dc.subject | Application Sandbox, | en_US |
dc.subject | Android | en_US |
dc.subject | iOS | en_US |
dc.subject | Malwares | en_US |
dc.subject | Operating Systems | en_US |
dc.subject | Sandbox | en_US |
dc.subject | System Security | en_US |
dc.title | A Formal Overview of Application Sandbox in Android and iOS with the Need to Secure | en_US |
dc.type | Article | en_US |
Appears in Collections: | Article Archives |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
A Formal Overview of Application Sandbox.pdf Restricted Access | A Formal Overview of Application | 4.48 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.