Modern smart-phone operating system use widely deployed
access control mechanisms and techniques. These
concepts are mainly based on process allow access
to resources or processes. the access rights are
granted to a particular process, it can perform the respective
operations on the resource. Hence, access rights are selected
for each application individually. Potentially malicious execution contexts are ignored. As a consequence, access rights
granted to one application may be used by another application in a malicious execution context.