A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Refactor, Reduce, Recycle: Restructuring the I/O Stack for the Future of Storage
2013
Computer
Emerging nonvolatile storage technologies promise orders-of-magnitude bandwidth increases and latency reductions, but fully realizing their potential requires minimizing storage software overhead and rethinking ...
Emerging fast, nonvolatile memory (NVM), such as flash and phase-change memory (PCM), alter the performance landscape of storage entirely and require software designers to rethink the importance and role ...
The file system is also responsible for enforcing permissions. ...
doi:10.1109/mc.2013.222
fatcat:6lnwvopfjffl7cmufkqcq446r4
SmartAuth: User-Centered Authorization for the Internet of Things
2017
USENIX Security Symposium
Through the interface, security policies can be generated and enforced by enhancing existing platforms. ...
Unfortunately, because few users act based upon, or even comprehend, permission screens, malicious or careless apps can become overprivileged by requesting unneeded permissions. ...
Mobile Permission Studies Many researchers have studied permission systems for mobile devices. ...
dblp:conf/uss/TianZLWUGT17
fatcat:fnv5tm6wszgedknufzl63xmbvq
Operating System Support for Augmented Reality Applications
2013
USENIX Workshop on Hot Topics in Operating Systems
Hence, the OS input abstractions must ensure that user privacy is not violated, and the OS must provide a fine-grained permission system for access to recognized objects like a user's face and skeleton ...
In this paper, we explore how operating systems should evolve to support AR applications. ...
A permission based approach is more promising, and recent work focuses on the psychology of asking for permissions in Android and other systems [10, 11] . ...
dblp:conf/hotos/DAntoniDJKLMMORSVW13
fatcat:was7wcdupraihku2cj37eosxju
Rethinking Security of Web-Based System Applications
2015
Proceedings of the 24th International Conference on World Wide Web - WWW '15
We then design, implement, and evaluate POWERGATE, a new access-control mechanism for Web-based system applications. ...
Many modern desktop and mobile platforms, including Ubuntu, Google Chrome, Windows, and Firefox OS, support so called Webbased system applications that run outside the Web browser and enjoy direct access ...
POWERGATE policies are platform-independent and enforced uniformly and securely on all platforms. ...
doi:10.1145/2736277.2741663
dblp:conf/www/GeorgievJS15
fatcat:nqfgzqlkcna2zb52h2vulrfgjm
Short paper
2012
Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '12
In spite of this increasing similarity, the permission systems protecting mobile device resources for native 1 and web apps are dramatically different. ...
We then propose a mechanism that presents a holistic view of the permissions required by a web app and provides a simple, single-stop permission management process. ...
We have taken the first step towards rethinking the permission system for mobile web apps. ...
doi:10.1145/2381934.2381939
dblp:conf/ccs/AmrutkarT12
fatcat:5n4enbah3ffkdcwjhlf5yd32t4
"Shhh...be quiet!" Reducing the Unwanted Interruptions of Notification Permission Prompts on Chrome
2021
USENIX Security Symposium
permission prompts in Chrome. ...
Chrome telemetry shows that, although 74% of all permission prompts are about notifications, they are also the least likely to be granted with only a 10% grant rate on desktop and 21% grant rate on Android ...
Their system outperformed mechanisms based on user-defined rules of their own interruptibility. More recently, Pielot et al. ...
dblp:conf/uss/BilogrevicEPTHP21
fatcat:av2ctuov2nhgrlkcl5bwaucxoq
Lowering the barriers to large-scale mobile crowdsensing
2013
Proceedings of the 14th Workshop on Mobile Computing Systems and Applications - HotMobile '13
However, deploying mobile crowdsensing applications in large-scale environments is not a trivial task. It creates a tremendous burden on application developers as well as mobile users. ...
In this paper we try to reveal the barriers hampering the scale-up of mobile crowdsensing applications, and to offer our initial thoughts on the potential solutions to lowering the barriers. ...
enforce user preferences on data sharing and crowd participation. ...
doi:10.1145/2444776.2444789
dblp:conf/wmcsa/XiaoSPHS13
fatcat:dne7s3hqarayfhnmurlgollhsq
Role Based Security and Java
[chapter]
1999
Database Security XII
The purpose of this chapter is to focus on the security capabilities and potentials of Java. ...
Mobile aglet security is progressing with the use of the Java sandbox mechanism and separation execution environments [6] . ...
Aglets offer the opportunity to rethink our URBS security approaches, which are class/method based for user roles, and whose definition process is focused on type-Ievel concerns. ...
doi:10.1007/978-0-387-35564-1_13
fatcat:e3nkazmgarc3bjj247gtdoa6hm
State of care for EU mobile workers' rights in the Dutch meat sector in times of, and beyond, COVID-19
2022
International journal of sociology and social policy
records and newspaper articles.FindingsThrough knowledge creation, boosted social dialogue mechanisms, enhanced enforcement capacity and new housing legislation, the Dutch State focuses on countering ...
of existing State and private enforcement institutions. ...
With the attempts to improve registration of EU mobile workers, the boosted social dialogue mechanisms, the enhanced enforcement capacity and new housing regulation, the Dutch State focuses on countering ...
doi:10.1108/ijssp-06-2022-0163
fatcat:76l24x6jcre7rmukzkvcif546e
Dynamic binding in mobile applications - A middleware approach
2003
IEEE Internet Computing
A Middleware Approach By separating binding concerns from application logic, the Colomba approach exploits metadata to let mobile applications adapt to dynamic environments. ...
When a user with a mobile terminal (MT) requests to start an MNS session, the system assigns a dedicated shadow proxy Proxy-ID. ...
The system provides any portable device with a companion middleware proxy -a shadow proxy -that autonomously acts on its behalf. ...
doi:10.1109/mic.2003.1189187
fatcat:i6wcdgcigfhvxcxbw5qicwhob4
A software exoskeleton to protect and support citizen's ethics and privacy in the digital world
2019
IEEE Access
The digital systems that surround them are increasingly able to make autonomous decisions over and above them and on their behalf. ...
They feel that their moral rights, as well as the social, economic, and political spheres, can be affected by the behavior of such systems. ...
INTRODUCTION In their ordinary life, citizens in the digital world continuously interact with software systems, e.g., by using a mobile device or from on board of a (autonomous) car. ...
doi:10.1109/access.2019.2916203
fatcat:vjtwepbj4ndz5kek6fta3luxu4
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone
[article]
2014
arXiv
pre-print
This study may inspire application developers and researchers rethink that zero permission doesn't mean safety and the speaker can be treated as a new attack surface. ...
Previous research about sensor based attacks on Android platform focused mainly on accessing or controlling over sensitive device components, such as camera, microphone and GPS. ...
Android OS uses a permission mechanism to enforce restrictions on the specific operations that a particular process can perform. ...
arXiv:1407.4923v1
fatcat:y6662hcsunbxxdyfenack53wk4
Autonomic communication services: a new challenge for software agents
2008
Autonomous Agents and Multi-Agent Systems
The continuous growth in ubiquitous and mobile network connectivity, together with the increasing number of networked devices populating our everyday environments, call for a deep rethinking of traditional ...
On this basis, we survey and compare different approaches, and eventually try to synthesize the key desirable characteristics that one should expect from a general-purpose component model for autonomic ...
deep rethinking of traditional communication and service architectures. ...
doi:10.1007/s10458-008-9054-9
fatcat:qafcewl36jeczc37ywe5rs4hky
Blockchain Application for the Paris Agreement Carbon Market Mechanism—A Decision Framework and Architecture
2020
Sustainability
We outline a system architecture that allows the linking of the heterogeneous systems, the integration of an Article 6.2 exchange mechanism, and the progress tracking of climate targets. ...
This paper evaluates the suitability of blockchain technology for the Article 6.2 carbon market mechanism of the Paris Agreement. ...
Instead, we need to 'rethink and redesign' the Article 6.2 mechanism architecture. ...
doi:10.3390/su12125069
fatcat:2v76omtdqffyfal5syvh7lzjdi
Serious Games: An Attractive Approach to Improve Awareness
[chapter]
2018
Community-Oriented Policing and Technological Innovations
The Pandora + training tool is a cloud-based client-server system which runs on a desktop or mobile device. ...
in community policing mechanisms and fostering citizen engagement. ...
doi:10.1007/978-3-319-89294-8_1
fatcat:r53cuqc7kbgoncxh7zn5ikcpqm
« Previous
Showing results 1 — 15 out of 11,190 results