structure our contribution as follows: Before Section 3
the control model
Section 2 explains the fundamentals of Android and reveals
existing security problems. Afterwards, Section 4 shows how
the usage control model is integrated in the Android system.
Section 5 discusses the in
uence of on the Android system architecture in terms of security, performance,
and usability. Finally, Section 6 compares it with related
work and Section 7 concludes our work and outlines future
research.