User-Driven Access Control: Rethinking Permission ... - CiteSeerX

Extrait du fichier (au format texte) :

User-Driven Access Control:
Rethinking Permission Granting in Modern Operating Systems
Franziska Roesner, Tadayoshi Kohno
{franzi, yoshi}@cs.washington.edu
University of Washington

Alexander Moshchuk, Bryan Parno, Helen J. Wang
{alexmos, parno, helenw}@microsoft.com
Microsoft Research, Redmond

Crispin Cowan crispin@microsoft.com
Microsoft
Abstract

tionality and security for access to the user s data and resources. From a functionality standpoint, isolation inhibits the client-side manipulation of user data across arbitrary applications. For example, the isolation of web sites makes it difficult to share photos between two online providers
(e.g., Picasa and Flickr) without manually downloading and re-uploading them. (While two such applications can prenegotiate data exchanges through IPC channels or other APIs,
requiring every pair of applications used by a user to prenegotiate is inefficient or impossible.) From a security standpoint, existing access control mechanisms tend to be coarsegrained, abrasive, or inadequate. For instance, they require users to make out-of-context, uninformed decisions at install time via manifests [3, 6], or they unintelligently prompt users to determine their intent [5, 20].
Thus, a pressing open problem in these systems is how to allow users to grant applications access to user-owned resources spanning different isolation boundaries, defined as privacy-and cost-sensitive devices and sensors (such as the camera, GPS, or SMS capabilities), system services and settings (such as the contact list or clipboard), and user content stored with various applications (such as photos or documents). To address this problem, we propose user-driven access control, whereby the system captures user intent via authentic user actions in the context of applications.
In particular, we introduce access control gadgets (ACGs)
as an operating system technique to capture user intent. Each user-owned resource exposes UI elements called ACGs for applications to embed. The user s authentic UI interactions with an ACG grant the embedding application permission to access the corresponding resource. Our design ensures the display integrity of ACGs, resists tampering by malicious applications, and allows the system to translate authentic user input on the ACGs into permissions.
The ACG mechanism enables a permission granting system that minimizes unintended access by letting users grant permissions at the time of use (unlike the manifest model)
and minimizes the burden on users by implicitly extracting a

Modern client platforms, such as iOS, Android, Windows
Phone, Windows 8, and web browsers, run each application in an isolated environment with limited privileges. A pressing open problem in such systems is how to allow users to grant applications access to user-owned resources, e.g., to privacyand cost-sensitive devices like the camera or to user data residing in other applications. A key challenge is to enable such access in a way that is non-disruptive to users while still maintaining least-privilege restrictions on applications.
In this paper, we take the approach of user-driven access control, whereby permission granting is built into existing

Les promotions

Promo
14.9 € 12.9 €


DictaNum : système de dialogue incrémental pour la dictée ... - Microsoft
DictaNum : système de dialogue incrémental pour la dictée ... - Microsoft
23/11/2017 - www.microsoft.com
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/262881756 DictaNum : système de dialogue incrémental pour la dictée de numéros. Conference Paper · July 2014 CITATIONS READS 0 57 3 authors, including: Hatim Khouzaimi Romain Laroche Orange Labs / Laboratoire Informatique d'Avi & Microsoft Maluuba 12 PUBLICATIONS 42 CITATIONS 58 PUBLICATIONS 185 CITATIONS SEE PROFILE SEE PROFILE All content following this page was uploaded by Hatim Khouzaimi on 06 June 2014. The user has requested enhancement of the downloaded file. 21ème...

User-Driven Access Control: Rethinking Permission ... - CiteSeerX
User-Driven Access Control: Rethinking Permission ... - CiteSeerX
23/08/2018 - www.microsoft.com
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems Franziska Roesner, Tadayoshi Kohno {franzi, yoshi}@cs.washington.edu University of Washington Alexander Moshchuk, Bryan Parno, Helen J. Wang {alexmos, parno, helenw}@microsoft.com Microsoft Research, Redmond Crispin Cowan crispin@microsoft.com Microsoft Abstract tionality and security for access to the user s data and resources. From a functionality standpoint, isolation inhibits the client-side manipulation...

Microsoft Modern Work Plan Comparison Education 11 2021
Microsoft Modern Work Plan Comparison Education 11 2021
14/09/2024 - www.microsoft.com
Add-on licenses Endpoint and app management Microsoft Product Terms Desktop client apps1 %? %? %? %? %? Office Mobile apps2 %? %? %? %? %? %? Install apps on up to 5 PCs/Mac + 5 tablets + 5 smartphones %?3 %? %? %?3 %? %? Office for the web %? %?

MatrixExplorer: Un système pour l'analyse exploratoire de ... - Microsoft
MatrixExplorer: Un système pour l'analyse exploratoire de ... - Microsoft
22/05/2017 - www.microsoft.com
MatrixExplorer: Un système pour l analyse exploratoire de réseaux sociaux Nathalie Henry Jean-Daniel Fekete INRIA Futurs/LRI/University of Sydney Bât 490, Université Paris-Sud 91405 Orsay Cedex Nathalie.Henry@lri.fr INRIA Futurs/LRI Bât 490, Université Paris-Sud 91405 Orsay Cedex Jean-Daniel.Fekete@inria.fr RESUME ABSTRACT Dans cet article, nous présentons le système MatrixExplorer destiné à explorer des réseaux sociaux. Il a été conçu pour des chercheurs en sciences sociales...

Surfacelaptopgo3 Ecoprofile
Surfacelaptopgo3 Ecoprofile
12/02/2026 - www.microsoft.com
ECOPROFILE Surface Laptop Go 3 Surface Laptop Go 3 Ecoprofile Last updated Oct 2023 ? Microsoft Corporation. All rights reserved Our commitments Microsoft is committed to becoming carbon negative, water positive, and zero waste by 20301. Surface plays a key role in helping Microsoft achieve these goals, so we are working to reduce the environmental impacts of our Surface products. Our approach embeds sustainability into the design, manufacturing, distribution, use, and end-of-life management...

Microsoft K State Whitepaper 2021 08 17
Microsoft K State Whitepaper 2021 08 17
23/09/2024 - www.microsoft.com
Cloud enclave for academic research Streamlining security and compliance at your institution August 2021 Contents Introduction........................................................................................................ 3 1. Assess where you are today........................................................................ 4 Work directly with researchers to identify challenges............................................................................... 4 Identify existing compliance...

Msft Microsoft Surface Pro 11th Edition Fact Sheet
Msft Microsoft Surface Pro 11th Edition Fact Sheet
10/10/2025 - www.microsoft.com
Surface Pro for Business Fact Sheet May 2024 The most flexible laptop, reimagined. The new Surface Pro is the most flexible 2-in-1 laptop, now reimagined with more speed and battery life for all-new AI experiences, powered by Snapdragon? X Elite and Plus processors with an industry leading NPU. All wrapped up in an ultra-portable design that can replace your tablet, your laptop, and power your multi-monitor set-up. The new Surface Pro Flex Keyboard allows you to position your Surface Pro and...

MSFT SurfaceLaptopIntel Fact Sheet
MSFT SurfaceLaptopIntel Fact Sheet
02/10/2025 - www.microsoft.com
Windows Hello for Business with facial recognition and Enhanced Sign-In Security Surface Laptop for Business Near-edgeless display and Surface's signature 3:2 ratio for more screen in a compact footprint Premium experiences drive AI advantage NPUs delivering 40 or 48 TOPS of on-device AI performance to support today's capabilities and tomorrow's innovations5 Anti-reflective technology reduces reflections up to 50% Optional smart card reader16 Exceptional AI-enabled collaboration and Copilot+...
 
 

Transformers Energon Megatron Sword
Transformers Energon Megatron Sword
05/04/2012 - www.hasbro.com
MEGATRON TM TM AGE EDAD :5 + 80351/80350 Asst. Energon Sword Espada de energón Épée à l'énergon transformers.com Requires 2 x 1.5v "C" or R14 size batteries (not included). Alkaline batteries recommended. Requiert 2 piles C ou R14 de 1,5 V (non incluses). Piles alcalines recommandées. Requiere 2 pilas C o R14 de 1,5 V (no incluidas). Se recomiendan pilas alcalinas. Tensión: 1,5 V x 2. Consumo: 0,3 A. HYPER POWERTM Blade Lame ULTRAPUISSANTE Hoja ULTRAPODEROSA Extendible sword! Épée...

LaCinema Classic - LaCie
LaCinema Classic - LaCie
23/05/2017 - www.lacie.com
LaCinema Classic Design by Ne il Poulton Multimedia Hard Disk Vos films, vos photos et votre musique sur votre télévision Connectez votre ordinateur et votre télévision Regardez vos films sur votre télévision haute définition en seulement deux étapes : il suffit de brancher le LaCinema Classic sur votre ordinateur pour stocker vos films, puis de le connecter à votre téléviseur pour les lire instantanément. Aucune configuration n est nécessaire. Vous gagnerez du temps et vous en...

Une Prise En Main Parfaite Pour Une Multitude Dapplications
Une Prise En Main Parfaite Pour Une Multitude Dapplications
13/03/2025 - www.bosch-professional.com
Une prise en main parfaite pour une multitude d'applications Outils pneumatiques pour la maintenance et le service www.boschproductiontools.com 2 | Outils pneumatiques Outils pneumatiques pour la maintenance et le service Outils pneumatiques | 3 Les outils sont particuli?rement efficaces : ils allient ergonomie, performances et un tr?s bon rapport prix/performances. Leur excellente maniabilit? dans les applications les plus diverses en fait les outils pneumatiques id?aux pour pour la maintenance...

Guide de l'utilisateur du téléphone Polycom ... - Polycom Support
Guide de l'utilisateur du téléphone Polycom ... - Polycom Support
13/06/2018 - www.polycom.fr
UTILISATION DU TÉLÉPHONE Utiliser les touches du téléphone Pour utiliser de nombreuses fonctions de votre téléphone, vous devez appuyer sur une touche interactive, une touche de défilement ou la touche de sélection. L illustration suivante montre l emplacement des touches interactives, des touches de défilement et de la touche de sélection sur votre téléphone. Téléphone Polycom® SoundStation® IP 7000 connecté à un système Polycom® HDX® ou à un système de groupe Polycom®...

Tempus Nova - Logitech
Tempus Nova - Logitech
05/12/2014 - www.logitech.com
Case Study: Tempus Nova Tempus Nova Leverages Logitech for Business Solutions to Increase Collaboration and Boost Productivity Logitech BCC950 ConferenceCam offers HD quality video and superior audio clarity to enhance technology consulting firm s virtual team meetings Company Size 32 employees Location Denver, Colorado Industry IT Consulting Overview Tempus Nova, Inc. is the leading provider of Google Enterprise solutions and is the sole developer of the tools used to migrate mail and calendar...

Iso 20243 Whitepaper
Iso 20243 Whitepaper
12/08/2024 - www.seagate.com
WHITE PAPER ISO 20243: Product Security Trust Through Certification The threat landscape is constantly evolving across all sectors of the technology industry. To meet this challenge, customers require an enhanced level of trust in products that form the foundation of the datasphere. Seagate is dedicated to achieving an industry leading security posture that addresses contemporary risks while providing adaptive resilience against new threats. This approach is grounded in a holistic approach toward...