International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 127

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016


A Survey Paper on Location Based Device Management Policy Framework for Smart Phone Users

Chinar Bhandari [3] | M. D. Ingle [11]


Abstract: Smart Phone Apps have numerous sources to access the sensitive data and vital resources within the user mobile phone. This vital data can be a threat for the user from the malicious apps which use your sensitive data for numerous purpose like privacy leakage or security threat. For Example A mischievous app recording your private business data or an unwanted app capturing your personal data can lead it to a security threat. So the main cause of this situation starts from that the android phone user has no control over his own device which leads to no control over his own data. Once the mischievous app has been granted with its access privileges, the android user simply loses control over all his sensitive information. However whether the granted access should work at any specific context or region can be handled by the device user by disabling the permissions or simply by revoking them. So in this paper we present you Location based policy management framework for smart phone user which helps you to set your own user policies at a given context/region where the user demands that none of the misleading apps should access his sensitive data. We have performed several test at different regions with different user policies to check if they work accurately.


Keywords: Location Based Access, Context Based Management, Device policy, Device administration, Framework


Edition: Volume 5 Issue 5, May 2016,


Pages: 375 - 377


How to Cite this Article?

Chinar Bhandari, M. D. Ingle, "A Survey Paper on Location Based Device Management Policy Framework for Smart Phone Users", International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 375-377, https://www.ijsr.net/get_abstract.php?paper_id=NOV163299

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Framework'

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar | Mohan K [15]

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 9, September 2022

Pages: 299 - 306

Object Detection Using Python

Khusbhu Bharti

Share this Article


Top