Framework on the Basis of Web Service Technology
Framework on the Basis of Web Service Technology With the developing of spatial information and internet technology, marine management departments begin to design and develop information systems on the basis of GIS technology. It helps government to improve their work efficiency. However different departments use different technologies, different data formats and different work flows, and […]
I am in ASEAN”: A Learning On Android Operating System
I am in ASEAN”: A Learning On Android Operating System am in ASEAN” is a learning media application developed on Android operating system. It was developed for children and youths to get a better understanding of the 10 member countries in ASEAN Community; i.e. Thailand, Laos, Vietnam, Cambodia, Myanmar, Malaysia, Singapore, Indonesia, Brunei Darussalam and […]
A Learning Media Application
A Learning Media Application The application has been developed for children and youths ages of 7 to 12 years to get better understanding of the 10 member countries of ASEAN community. The content is focused on the basics knowledge of the ASEAN communityecause it is the first step of preparation to be a part of […]
Android Based Exam Paper Generator
Android Based Exam Paper Generator Exam Paper Generator provides a solution to choose challenging, well framed questions and make it easy for the instructor to generate it within a short period of time. This can be done in a few taps of the hand as it is an Android application, therefore accessible at any time […]
Issues and Solutions in android
Issues and Solutions in android Due to misuse of various app permissions, it is possible for various security threats. Among various threats, it is possible for Android applications to read messages, send messages. SMS is a common and basic functionality in traditional mobile and smartphone. All confidential information based on two-factor authentication has been sent […]
Android Security
Android Security Android operating system uses the permission-based model which allows Android applications to access user information, system information, device information and external resources of Smartphone. The developer needs to declare the permissions for the Android application. The user needs to accept these permissions for successful installation of an Android application. These permissions are declarations. […]
Application and Defence in android
Application and Defence in android According to the structure of Android’s application, we can change apk/dex file or the mapped memory to hack application. There are two methods differ from when to change the application, one is static while the changing is happened in the not running period of this application such as changing the […]
Hack Android Application
Hack Android Application Now Android is the most popular smart device’s operating system, at the same time the attacks aimed at Android increases very fast. The security problem is more and more important for Android and the researchers pay more attention to Android’s security. This paper analysis the character of Android application file and its […]
Analyzing of Android Application
Analyzing of Android Application As mobile phones are becoming a main approachfor people to use to access internet, security is a major concernwhen people are using their mobile phones. Different from theweb browser which has mature isolation mechanisms to protectusers’ information such as cookies and credentials, Androidapp developers have to implement the isolation mechanism suchas […]
Security Property of Formal Method
Security Property of Formal Method Information leak occurs when a malicious application col-lects sensitive personal information and sends the informationto an adversary without user’s acknowledgement and consent.It is becoming one of the most significant security issues inrecent years [18], [19].The topic of information flow or data flow is an oldtopic and it has been studied […]
Formal Method of Analyzing Security Property of Android Application
Formal Method of Analyzing Security Property of Android Application It is a general process of a successful SSO login. However,the details might be different under different SSO implemen-tations.1) First, a user sends a request to login to the SP with itsidentity on an IdP.2) The SP requires user to provide an access token fromthe IdP […]
Android ApplicationImplementation
Android ApplicationImplementation To ease this problem, the author first intuitively transformsthe refined protocol into an intermediate representation whichis close to typed Pi-calculus. Later, the intermediate repre-sentation can be translated to typed Pi-calculus much easier.The refined protocol is then modelled in a basic formal modelin typed Pi-calculus which contains no adversaries. Based onthe basic model, the […]
Analyzing Security Property of Android Application
Analyzing Security Property of Android Application The implementation of Facebook SSO loginprotocol on Android. User is not shown on Fig. 2 for concisionand the user will interact with Android when it needs to suchas clicking login button or inputting user’s credentials.1) User requests to login to SP and SP initiates a requestto Facebook SDK asking […]
Implementation Using Formal Method
Implementation Using Formal Method As mobile phones are becoming a main approachfor people to use to access internet, security is a major concernwhen people are using their mobile phones. Different from theweb browser which has mature isolation mechanisms to protectusers’ information such as cookies and credentials, Androidapp developers have to implement the isolation mechanism suchas […]