The distinction between mobile applications built for specific plat-forms and that run in mobile browsers is increasingly being blurred. As HTML5 becomes universally deployed and mobile web apps directly take advantage of device features such as the camera, mi-crophone and geolocation information, this difference will vanish almost entirely. In spite of this increasing similarity, the permission systems protecting mobile device resources for native1 and web apps are dramatically different. In this position paper, we argue that the increasing indistinguishability between such apps coupled with the dynamic nature of mobile web apps calls for reconsidering the current permission model for mobile web apps. We first discuss factors associated wi...
Abstract—Mobile operating systems (e.g., iOS, Android, Windows Mobile, etc) are becoming powerful pl...
Mobile apps that use an embedded web browser, or mobile web apps, make up 85 % of the free apps on t...
The common mechanism for controlling security and privacy data on mobile platforms is through the ap...
Many smartphone operating systems implement strong sandboxing for 3rd party application software. As...
How can we, as platform designers, protect computer users from the threats associated with malicious...
Consumers in the mobile ecosystem can putatively protect their privacy with the use of application p...
With the recent developments in the cellular world, the high-end mobile phones and PDAs are becoming...
Mobile phones are no longer static devices that simply make phone calls and send SMS messages. Moder...
HTML5-based mobile applications are becoming more and more popular because they can run on different...
Research Article published by International Journal of Computing and Digital SystemsContemporary dev...
Abstract. The proliferation of smartphones has introduced new challenges in web browsing security. T...
Research Article published by International Journal of Computer and Information Technology Volume 03...
People's increasingly relying on web applications to manage their digital assets makes web auth...
by Google in the form of an unrestricted grant to the Mobile Commerce Laboratory. The authors would ...
Smartphones play irreplaceable role in our daily life. When users enjoy the functions, convenience, ...
Abstract—Mobile operating systems (e.g., iOS, Android, Windows Mobile, etc) are becoming powerful pl...
Mobile apps that use an embedded web browser, or mobile web apps, make up 85 % of the free apps on t...
The common mechanism for controlling security and privacy data on mobile platforms is through the ap...
Many smartphone operating systems implement strong sandboxing for 3rd party application software. As...
How can we, as platform designers, protect computer users from the threats associated with malicious...
Consumers in the mobile ecosystem can putatively protect their privacy with the use of application p...
With the recent developments in the cellular world, the high-end mobile phones and PDAs are becoming...
Mobile phones are no longer static devices that simply make phone calls and send SMS messages. Moder...
HTML5-based mobile applications are becoming more and more popular because they can run on different...
Research Article published by International Journal of Computing and Digital SystemsContemporary dev...
Abstract. The proliferation of smartphones has introduced new challenges in web browsing security. T...
Research Article published by International Journal of Computer and Information Technology Volume 03...
People's increasingly relying on web applications to manage their digital assets makes web auth...
by Google in the form of an unrestricted grant to the Mobile Commerce Laboratory. The authors would ...
Smartphones play irreplaceable role in our daily life. When users enjoy the functions, convenience, ...
Abstract—Mobile operating systems (e.g., iOS, Android, Windows Mobile, etc) are becoming powerful pl...
Mobile apps that use an embedded web browser, or mobile web apps, make up 85 % of the free apps on t...
The common mechanism for controlling security and privacy data on mobile platforms is through the ap...