• No results found

Automated Evaluation of Access Control in the iPhone Operating System.

N/A
N/A
Protected

Academic year: 2020

Share "Automated Evaluation of Access Control in the iPhone Operating System."

Copied!
136
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 2.1 Overview of iOS access control according to access revocability and resource being managed.
Figure 2.2 Sandbox Architecture
Figure 2.3 Privacy Settings Policy Architecture
Table 2.1 tccd managed privacy settings for iOS 8.
+7

References

Related documents