Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Felt, Adrienne Porter"'
Android and Facebook provide third-party applications with access to users' private data and the ability to perform potentially sensitive operations (e.g., post to a user's wall or place phone calls). As a security measure, these platforms restrict a
Externí odkaz:
http://arxiv.org/abs/1210.2429
Publikováno v:
Felt, Adrienne Porter; Egelman, Serge; Finifter, Matthew; Akhawe, Devdatta; & Wagner, David. (2012). How To Ask For Permission. HotSec, Advance online publication, 0. UC Berkeley: Retrieved from: http://www.escholarship.org/uc/item/0zm6t1dg
Application platforms provide applications with accessto hardware (e.g., GPS and cameras) and personal data.Modern platforms use permission systems to protect access to these resources. The nature of these permissionsystems vary widely across platfor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______325::c24a1bc1c394e7182b553ae862a4393d
http://www.escholarship.org/uc/item/0zm6t1dg
http://www.escholarship.org/uc/item/0zm6t1dg
Autor:
Felt, Adrienne Porter
Publikováno v:
Felt, Adrienne Porter. (2012). Towards Comprehensible and Effective Permission Systems. UC Berkeley: Computer Science. Retrieved from: http://www.escholarship.org/uc/item/8h695639
How can we, as platform designers, protect computer users from the threats associated with malicious, privacy-invasive, and vulnerable applications? Modern platforms have turned away from the traditional user-based permission model and begun adopting
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______325::2dd8f191e400fbe3e5b71eb1628d8abe
http://n2t.net/ark:/13030/m59w0khw
http://n2t.net/ark:/13030/m59w0khw
Publikováno v:
Economics of Information Security & Privacy; 2013, p211-236, 26p
Publikováno v:
Proceedings of the 1st ACM Workshop: Security & Privacy in Smartphones & Mobile Devices; Oct2011, p3-14, 12p
Publikováno v:
Proceedings of the 18th ACM Conference: Computer & Communications Security; Oct2011, p627-638, 12p
Publikováno v:
Proceedings of the 9th International Conference: Mobile Systems, Applications & Services; 6/28/2011, p239-252, 14p
Publikováno v:
Proceedings of the 6th ACM Symposium: Information, Computer & Communications Security; 3/22/2011, p416-422, 7p
Publikováno v:
Proceedings of the 19th International Conference: World Wide Web; 4/26/2010, p721-730, 10p
Autor:
Van Bulck, Jo, Minkin, Marina, Weisse, Ofir, Genkin, Daniel, Kasikci, Baris, Piessens, Frank, Silberstein, Mark, Wenisch, Thomas F, Yarom, Yuval, Strackx, Raoul
Trusted execution environments, and particularly the Software Guard eXtensions (SGX) included in recent Intel x86 processors, gained significant traction in recent years. A long track of research papers, and increasingly also realworld industry appli
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1131::cafba68439e2d17e9add1f8cff025457
https://lirias.kuleuven.be/handle/123456789/626643
https://lirias.kuleuven.be/handle/123456789/626643