User-Driven Access Control: Rethinking Permission ... - CiteSeerX

Extrait du fichier (au format texte) :

User-Driven Access Control:
Rethinking Permission Granting in Modern Operating Systems
Franziska Roesner, Tadayoshi Kohno
{franzi, yoshi}@cs.washington.edu
University of Washington

Alexander Moshchuk, Bryan Parno, Helen J. Wang
{alexmos, parno, helenw}@microsoft.com
Microsoft Research, Redmond

Crispin Cowan crispin@microsoft.com
Microsoft
Abstract

tionality and security for access to the user s data and resources. From a functionality standpoint, isolation inhibits the client-side manipulation of user data across arbitrary applications. For example, the isolation of web sites makes it difficult to share photos between two online providers
(e.g., Picasa and Flickr) without manually downloading and re-uploading them. (While two such applications can prenegotiate data exchanges through IPC channels or other APIs,
requiring every pair of applications used by a user to prenegotiate is inefficient or impossible.) From a security standpoint, existing access control mechanisms tend to be coarsegrained, abrasive, or inadequate. For instance, they require users to make out-of-context, uninformed decisions at install time via manifests [3, 6], or they unintelligently prompt users to determine their intent [5, 20].
Thus, a pressing open problem in these systems is how to allow users to grant applications access to user-owned resources spanning different isolation boundaries, defined as privacy-and cost-sensitive devices and sensors (such as the camera, GPS, or SMS capabilities), system services and settings (such as the contact list or clipboard), and user content stored with various applications (such as photos or documents). To address this problem, we propose user-driven access control, whereby the system captures user intent via authentic user actions in the context of applications.
In particular, we introduce access control gadgets (ACGs)
as an operating system technique to capture user intent. Each user-owned resource exposes UI elements called ACGs for applications to embed. The user s authentic UI interactions with an ACG grant the embedding application permission to access the corresponding resource. Our design ensures the display integrity of ACGs, resists tampering by malicious applications, and allows the system to translate authentic user input on the ACGs into permissions.
The ACG mechanism enables a permission granting system that minimizes unintended access by letting users grant permissions at the time of use (unlike the manifest model)
and minimizes the burden on users by implicitly extracting a

Modern client platforms, such as iOS, Android, Windows
Phone, Windows 8, and web browsers, run each application in an isolated environment with limited privileges. A pressing open problem in such systems is how to allow users to grant applications access to user-owned resources, e.g., to privacyand cost-sensitive devices like the camera or to user data residing in other applications. A key challenge is to enable such access in a way that is non-disruptive to users while still maintaining least-privilege restrictions on applications.
In this paper, we take the approach of user-driven access control, whereby permission granting is built into existing

Les promotions



Msft Microsoft Surface Pro 11th Edition Fact Sheet
Msft Microsoft Surface Pro 11th Edition Fact Sheet
10/10/2025 - www.microsoft.com
Surface Pro for Business Fact Sheet May 2024 The most flexible laptop, reimagined. The new Surface Pro is the most flexible 2-in-1 laptop, now reimagined with more speed and battery life for all-new AI experiences, powered by Snapdragon? X Elite and Plus processors with an industry leading NPU. All wrapped up in an ultra-portable design that can replace your tablet, your laptop, and power your multi-monitor set-up. The new Surface Pro Flex Keyboard allows you to position your Surface Pro and...

L'économie de la sécurité - Microsoft
L'économie de la sécurité - Microsoft
16/11/2016 - www.microsoft.com
nl y se Lect L économie de la sécurité Ces dernières années, la sécurité est devenue une priorité pour les pouvoirs publics et les entreprises. Crime organisé, terrorisme, interruption des chaînes d approvisionnement mondiales, virus informatiques  autant de menaces avec lesquelles il faut compter dans le monde d aujourd hui. D où l émergence d un marché des équipements et des services de sécurité de 100 milliards de dollars. Ce marché est alimenté par la demande croissante émanant...

Microsoft Modern Work Plan Comparison Education 11 2021
Microsoft Modern Work Plan Comparison Education 11 2021
14/09/2024 - www.microsoft.com
Add-on licenses Endpoint and app management Microsoft Product Terms Desktop client apps1 %? %? %? %? %? Office Mobile apps2 %? %? %? %? %? %? Install apps on up to 5 PCs/Mac + 5 tablets + 5 smartphones %?3 %? %? %?3 %? %? Office for the web %? %?

C dric FOURNET LE JOIN-CALCUL : UN CALCUL POUR ... - Microsoft
C dric FOURNET LE JOIN-CALCUL : UN CALCUL POUR ... - Microsoft
11/04/2018 - www.microsoft.com
TH SE pr sent e L' COLE POLYTECHNIQUE pour obtenir le titre de DOCTEUR DE L' COLE POLYTECHNIQUE sp cialit : INFORMATIQUE par C dric FOURNET Sujet de la th se : LE JOIN-CALCUL : UN CALCUL POUR LA PROGRAMMATION R PARTIE ET MOBILE The Join-Calculus: a Calculus for Distributed Mobile Programming Soutenue le 23 Novembre 1998 devant le jury compos de : MM. Robin Milner Roberto Amadio G rard Boudol Jean-Jacques L vy G rard Berry Luca Cardelli Georges Gonthier Pr sident Rapporteurs Directeur de th...

MSR Quantum applications - Microsoft
MSR Quantum applications - Microsoft
23/08/2018 - www.microsoft.com
( What Can We Do with a Quantum Computer? ( Matthias Troyer  Station Q, ETH Zurich | 1 Classical computers have come a long way Antikythera mechanism ENIAC astronomical positions (1946) (100 BC) Kelvin s harmonic analyzer prediction of tides (1878) Difference Engine (1822) Is there anything that we cannot solve on future supercomputers? Titan, ORNL (2013) Matthias Troyer | | 2 How long will Moore s law continue? Do we see signs of the end of Moore s law? Can we go below 7nm...

User-Driven Access Control: Rethinking Permission ... - CiteSeerX
User-Driven Access Control: Rethinking Permission ... - CiteSeerX
23/08/2018 - www.microsoft.com
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems Franziska Roesner, Tadayoshi Kohno {franzi, yoshi}@cs.washington.edu University of Washington Alexander Moshchuk, Bryan Parno, Helen J. Wang {alexmos, parno, helenw}@microsoft.com Microsoft Research, Redmond Crispin Cowan crispin@microsoft.com Microsoft Abstract tionality and security for access to the user s data and resources. From a functionality standpoint, isolation inhibits the client-side manipulation...

Architectures reconfigurables et traitement de proble`mes ... - Microsoft
Architectures reconfigurables et traitement de proble`mes ... - Microsoft
16/11/2016 - www.microsoft.com
RECHERCHE Architectures reconfigurables et traitement de proble`mes NP-difficiles : un nouveau domaine d application Youssef Hamadi    David Merceron  '  ' LIRMM, UMR 5506 CNRS/Universite´ Montpellier II 161, Rue Ada, 34392 Montpellier Cedex 5 hamadi@lirmm.fr ''' EURIWARE, 12-14 rue du fort de St-Cyr 78067 St Quentin-en-Yvelines Cedex damercer@euriware.fr RE´SUME´. L algorithme GSAT est un algorithme de recherche locale. Cette me´thode recherche la premie`re instanciation...

D6. 4: Final evaluation of CLASSiC TownInfo and ... - Microsoft
D6. 4: Final evaluation of CLASSiC TownInfo and ... - Microsoft
23/11/2017 - www.microsoft.com
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/228835240 D6. 4: Final evaluation of CLASSiC TownInfo and Appointment Scheduling systems Article · May 2011 CITATIONS READS 15 56 11 authors, including: Helen Hastie Filip Jurcicek Heriot-Watt University Charles University in Prague 105 PUBLICATIONS 858 CITATIONS 55 PUBLICATIONS 439 CITATIONS SEE PROFILE SEE PROFILE Oliver Joseph Lemon Steve Young Heriot-Watt University University of Cambridge 323 PUBLICATIONS 3,678 CITATIONS 310 PUBLICATIONS 14,308 CITATIONS SEE PROFILE SEE PROFILE Some of the authors of this publication are also working on these related projects: MaDrIgAL: Multi-Dimensional Interaction management and Adaptive Learning View project ...
 
 

Temporis IP315 GUIDE RAPIDE
Temporis IP315 GUIDE RAPIDE
19/02/2018 - www.alcatel-home.com
" Casque : brancher le casque, composer le numéro et appuyer sur la touche . Note: si vous avez plus d un compte SIP actif, depuis le Temporis IP300 sélectionner le compte que vous souhaitez utiliser avant de composer le numéro. Temporis IP315 GUIDE RAPIDE Réception d un appel depuis le combiné Alcatel IP15 " Combiné : appuyer sur . " Casque : depuis un casque branché sur le port jack, appuyer sur " Mains libres : appuyez sur . Note: pour répondre à un 2ème appel, appuyer sur REPON. . Au...

En US 7278348394 202208161302716 ENERGY LABEL EU 2021 EPen US
En US 7278348394 202208161302716 ENERGY LABEL EU 2021 EPen US
10/06/2025 - www.grundig.com
GRUNDIG GLRN 66820 X 7278348394 143 365 35

Linksys EA4500 I Routeur double bande N900 ... - eBizness Services
Linksys EA4500 I Routeur double bande N900 ... - eBizness Services
16/02/2018 - downloads.linksys.com
App Enabled WiFi Home Base Application pour périphériques iOS et Android pour contrôler votre réseau domestique Linksys EA4500 I Routeur double bande N900 avec Gigabit et USB Créez un réseau domestique sans fil hautes performances en quelques étapes simples, optimisé pour la diffusion de contenu HD et pour l utilisation de jeux en ligne Idéal pour : " " " " Logements spacieux et zones très peuplées Connecter en Wi-Fi tous vos périphériques Diffuser vos vidéos HD sur des tablettes,...

Manuel d'utilisation - Vtech
Manuel d'utilisation - Vtech
21/07/2016 - www.vtech-jouets.com
Manuel d utilisation © 2011 VTech Imprimé en Chine 91-002604-001 Chers parents, Chez VTech®, nous sommes conscients que les enfants sont notre avenir. C est pourquoi tous nos jeux sont conçus de manière à entretenir et renforcer leur désir d apprendre. Toute la technologie et le sens de la pédagogie VTech® sont mis au service de la connaissance pour faciliter la découverte des lettres, des mots, des chiffres, des opérations & Chez VTech®, nous nous engageons à tout faire pour...

ISTRUZIONI PER L'USO
ISTRUZIONI PER L'USO
20/03/2015 - docs.whirlpool.eu
ISTRUZIONI PER L USO CONSIGLI PER LA SALVAGUARDIA DELL AMBIENTE AVVERTENZE PRIMA DI USARE IL FORNO ACCESSORI DEL FORNO MANUTENZIONE E PULIZIA GUIDA RICERCA GUASTI SERVIZIO ASSISTENZA Per utilizzare al meglio il forno, vi invitiamo a leggere attentamente tutte le istruzioni per l uso e a conservarle in caso di necessità. 36 CONSIGLI PER LA SALVAGUARDIA DELL AMBIENTE Smaltimento imballaggio " Il materiale di imballaggio è riciclabile al 100% ed è contrassegnato dal simbolo del riciclaggio . ...

COMBINÉ
COMBINÉ
19/02/2012 - www.lg.com
COMBINÉ MC-8290NB EQUIPEMENTS Capacité Programmation Type Cavité Type d'ouverture de porte litres 32 Electronique Bouton Semi-arrondie Porte latérale watts 900 OUI 5 watts 1 250 MICRO-ONDES Puissance restituée Double diffuseur d'ondes Niveaux de puissance GRIL Puissance absorbée Type de résistance Voûte QUARTZ CHALEUR PULSÉE Puissance absorbée watts 2 050 watts watts 2 550