메뉴 건너뛰기




Volumn , Issue , 2012, Pages 224-238

User-driven access control: Rethinking permission granting in modern operating systems

Author keywords

access control; access control gadgets; ACGs; least privilege; operating systems; permission granting; permissions; user intent; user driven access control; user owned resources

Indexed keywords

WEB BROWSERS;

EID: 84874840847     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2012.24     Document Type: Conference Paper
Times cited : (161)

References (40)
  • 2
    • 85175130226 scopus 로고    scopus 로고
    • ANDROID OS. http://www.android.com/.
  • 4
    • 85175130052 scopus 로고    scopus 로고
    • APPLE. iOS4, 2011. http://www.apple.com/iphone/.
    • (2011) iOS4
  • 5
    • 84873741695 scopus 로고    scopus 로고
    • Febuary
    • BALLANO, M. Android Threats Getting Steamy. Symantec Official Blog, Febuary 2011. http://www.symantec.com/connect/blogs/android-threats-getting- steamy.
    • (2011) Android Threats Getting Steamy
    • Ballano, M.1
  • 7
    • 85175130880 scopus 로고    scopus 로고
    • CHROMIUM. Feb.
    • CHROMIUM. Security Issues. https://code.google.com/p/chromium/issues/ list?q=label:Security, Feb. 2011.
    • (2011) Security Issues
  • 10
    • 84859082751 scopus 로고    scopus 로고
    • FACEBOOK. Apps on Facebook.com, 2011. http://developers.facebook.com/ docs/guides/.
    • (2011) Apps on Facebook.com
  • 11
    • 80755172898 scopus 로고    scopus 로고
    • The effectiveness of application permissions
    • June
    • FELT, A. P., GREENWOOD, K., AND WAGNER, D. The effectiveness of application permissions. In USENIX WebApps (June 2011).
    • (2011) USENIX WebApps
    • Felt, A.P.1    Greenwood, K.2    Wagner, D.3
  • 14
    • 33846306388 scopus 로고    scopus 로고
    • A Nitpicker's guide to a minimal-complexity secure GUI
    • FESKE, N., AND HELMUTH, C. A Nitpicker's guide to a minimal-complexity secure GUI. In ACSAC (2005).
    • (2005) ACSAC
    • Feske, N.1    Helmuth, C.2
  • 16
    • 84878363259 scopus 로고    scopus 로고
    • What You See Is What They Get: Protecting Users from Unwanted Use of Microphones, Camera, and Other Sensors
    • HOWELL, J., AND SCHECHTER, S. What You See Is What They Get: Protecting Users from Unwanted Use of Microphones, Camera, and Other Sensors. In Web 2.0 Security and Privacy Workshop (2010).
    • Web 2.0 Security and Privacy Workshop (2010)
    • Howell, J.1    Schechter, S.2
  • 18
    • 78650002259 scopus 로고    scopus 로고
    • Blade: An attack-agnostic approach for preventing drive-by malware infections
    • LU, L., YEGNESWARAN, V., PORRAS, P., AND LEE, W. Blade: an attack-agnostic approach for preventing drive-by malware infections. In ACM CCS (2010).
    • (2010) ACM CCS
    • Lu, L.1    Yegneswaran, V.2    Porras, P.3    Lee, W.4
  • 19
    • 0026681952 scopus 로고
    • Fitts' Law as a Research and Design Tool in Human-Computer Interaction
    • MACKENZIE, I. S. Fitts' Law as a Research and Design Tool in Human-Computer Interaction. Human-Computer Interaction (HCI) 7(1) (1992), 91-139.
    • (1992) Human-Computer Interaction (HCI) , vol.7 , Issue.1 , pp. 91-139
    • Mackenzie, I.S.1
  • 21
    • 84866918614 scopus 로고    scopus 로고
    • MICROSOFT. What is User Account Control?, 2011. http://windows.microsoft. com/en-US/windows-vista/What-is-User-Account-Control.
    • (2011) What Is User Account Control?
  • 23
    • 80052803379 scopus 로고    scopus 로고
    • Do Windows Users Follow the Principle of Least Privilege?: Investigating User Account Control Practices
    • MOTIEE, S., HAWKEY, K., AND BEZNOSOV, K. Do Windows Users Follow the Principle of Least Privilege?: Investigating User Account Control Practices. In Symposium on Usable Privacy & Security (2010).
    • Symposium on Usable Privacy & Security (2010)
    • Motiee, S.1    Hawkey, K.2    Beznosov, K.3
  • 26
    • 33845953872 scopus 로고    scopus 로고
    • Jan.
    • NSA CENTRAL SECURITY SERVICE. Security-Enhanced Linux. http://www.nsa.gov/research/selinux/, Jan. 2009.
    • (2009) Security-Enhanced Linux
  • 27
    • 50249114395 scopus 로고    scopus 로고
    • Automated detection of persistent kernel control-flow attacks
    • PETRONI, J R ., N. L., AND HICKS, M. Automated detection of persistent kernel control-flow attacks. In ACM CCS (2007).
    • (2007) ACM CCS
    • Petroni, J.R.1    L, N.2    Hicks, M.3
  • 30
    • 77955224892 scopus 로고    scopus 로고
    • SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
    • SESHADRI, A., LUK, M., QU, N., AND PERRIG, A. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In ACM SOSP (2007).
    • (2007) ACM SOSP
    • Seshadri, A.1    Luk, M.2    Qu, N.3    Perrig, A.4
  • 34
    • 84857516359 scopus 로고    scopus 로고
    • Trust and Protection in the Illinois Browser Operating System
    • TANG, S., MAI, H., AND KING, S. T. Trust and Protection in the Illinois Browser Operating System. In USENIX OSDI (2010).
    • (2010) USENIX OSDI
    • Tang, S.1    Mai, H.2    King, S.T.3
  • 39
    • 12844271558 scopus 로고    scopus 로고
    • Aligning Security and Usability
    • Sept.
    • YEE, K.-P. Aligning Security and Usability. IEEE Security and Privacy 2(5) (Sept. 2004), 48-55.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 48-55
    • Yee, K.-P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.