Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








11,190 Hits in 3.7 sec

Refactor, Reduce, Recycle: Restructuring the I/O Stack for the Future of Storage

Steven Swanson, Adrian M. Caulfield
2013 Computer  
Emerging nonvolatile storage technologies promise orders-of-magnitude bandwidth increases and latency reductions, but fully realizing their potential requires minimizing storage software overhead and rethinking  ...  Emerging fast, nonvolatile memory (NVM), such as flash and phase-change memory (PCM), alter the performance landscape of storage entirely and require software designers to rethink the importance and role  ...  The file system is also responsible for enforcing permissions.  ... 
doi:10.1109/mc.2013.222 fatcat:6lnwvopfjffl7cmufkqcq446r4

SmartAuth: User-Centered Authorization for the Internet of Things

Yuan Tian, Nan Zhang, Yue-Hsun Lin, XiaoFeng Wang, Blase Ur, Xianzheng Guo, Patrick Tague
2017 USENIX Security Symposium  
Through the interface, security policies can be generated and enforced by enhancing existing platforms.  ...  Unfortunately, because few users act based upon, or even comprehend, permission screens, malicious or careless apps can become overprivileged by requesting unneeded permissions.  ...  Mobile Permission Studies Many researchers have studied permission systems for mobile devices.  ... 
dblp:conf/uss/TianZLWUGT17 fatcat:fnv5tm6wszgedknufzl63xmbvq

Operating System Support for Augmented Reality Applications

Loris D'Antoni, Alan M. Dunn, Suman Jana, Tadayoshi Kohno, Benjamin Livshits, David Molnar, Alexander Moshchuk, Eyal Ofek, Franziska Roesner, T. Scott Saponas, Margus Veanes, Helen J. Wang
2013 USENIX Workshop on Hot Topics in Operating Systems  
Hence, the OS input abstractions must ensure that user privacy is not violated, and the OS must provide a fine-grained permission system for access to recognized objects like a user's face and skeleton  ...  In this paper, we explore how operating systems should evolve to support AR applications.  ...  A permission based approach is more promising, and recent work focuses on the psychology of asking for permissions in Android and other systems [10, 11] .  ... 
dblp:conf/hotos/DAntoniDJKLMMORSVW13 fatcat:was7wcdupraihku2cj37eosxju

Rethinking Security of Web-Based System Applications

Martin Georgiev, Suman Jana, Vitaly Shmatikov
2015 Proceedings of the 24th International Conference on World Wide Web - WWW '15  
We then design, implement, and evaluate POWERGATE, a new access-control mechanism for Web-based system applications.  ...  Many modern desktop and mobile platforms, including Ubuntu, Google Chrome, Windows, and Firefox OS, support so called Webbased system applications that run outside the Web browser and enjoy direct access  ...  POWERGATE policies are platform-independent and enforced uniformly and securely on all platforms.  ... 
doi:10.1145/2736277.2741663 dblp:conf/www/GeorgievJS15 fatcat:nqfgzqlkcna2zb52h2vulrfgjm

Short paper

Chaitrali Amrutkar, Patrick Traynor
2012 Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '12  
In spite of this increasing similarity, the permission systems protecting mobile device resources for native 1 and web apps are dramatically different.  ...  We then propose a mechanism that presents a holistic view of the permissions required by a web app and provides a simple, single-stop permission management process.  ...  We have taken the first step towards rethinking the permission system for mobile web apps.  ... 
doi:10.1145/2381934.2381939 dblp:conf/ccs/AmrutkarT12 fatcat:5n4enbah3ffkdcwjhlf5yd32t4

"Shhh...be quiet!" Reducing the Unwanted Interruptions of Notification Permission Prompts on Chrome

Igor Bilogrevic, Balazs Engedy, Judson L. Porter III, Nina Taft, Kamila Hasanbega, Andrew Paseltiner, Hwi Kyoung Lee, Edward Jung, Meggyn Watkins, P. J. McLachlan, Jason James
2021 USENIX Security Symposium  
permission prompts in Chrome.  ...  Chrome telemetry shows that, although 74% of all permission prompts are about notifications, they are also the least likely to be granted with only a 10% grant rate on desktop and 21% grant rate on Android  ...  Their system outperformed mechanisms based on user-defined rules of their own interruptibility. More recently, Pielot et al.  ... 
dblp:conf/uss/BilogrevicEPTHP21 fatcat:av2ctuov2nhgrlkcl5bwaucxoq

Lowering the barriers to large-scale mobile crowdsensing

Yu Xiao, Pieter Simoens, Padmanabhan Pillai, Kiryong Ha, Mahadev Satyanarayanan
2013 Proceedings of the 14th Workshop on Mobile Computing Systems and Applications - HotMobile '13  
However, deploying mobile crowdsensing applications in large-scale environments is not a trivial task. It creates a tremendous burden on application developers as well as mobile users.  ...  In this paper we try to reveal the barriers hampering the scale-up of mobile crowdsensing applications, and to offer our initial thoughts on the potential solutions to lowering the barriers.  ...  enforce user preferences on data sharing and crowd participation.  ... 
doi:10.1145/2444776.2444789 dblp:conf/wmcsa/XiaoSPHS13 fatcat:dne7s3hqarayfhnmurlgollhsq

Role Based Security and Java [chapter]

D. Smarkusky, S. Demurjian, M. Bastarrica, T. C. Ting
1999 Database Security XII  
The purpose of this chapter is to focus on the security capabilities and potentials of Java.  ...  Mobile aglet security is progressing with the use of the Java sandbox mechanism and separation execution environments [6] .  ...  Aglets offer the opportunity to rethink our URBS security approaches, which are class/method based for user roles, and whose definition process is focused on type-Ievel concerns.  ... 
doi:10.1007/978-0-387-35564-1_13 fatcat:e3nkazmgarc3bjj247gtdoa6hm

State of care for EU mobile workers' rights in the Dutch meat sector in times of, and beyond, COVID-19

Lisa Berntsen, Anita Böcker, Tesseltje De Lange, Sandra Mantu, Natalia Skowronek
2022 International journal of sociology and social policy  
records and newspaper articles.FindingsThrough knowledge creation, boosted social dialogue mechanisms, enhanced enforcement capacity and new housing legislation, the Dutch State focuses on countering  ...  of existing State and private enforcement institutions.  ...  With the attempts to improve registration of EU mobile workers, the boosted social dialogue mechanisms, the enhanced enforcement capacity and new housing regulation, the Dutch State focuses on countering  ... 
doi:10.1108/ijssp-06-2022-0163 fatcat:76l24x6jcre7rmukzkvcif546e

Dynamic binding in mobile applications - A middleware approach

P. Bellavista, A. Corradi, R. Montanari, C. Stefanelli
2003 IEEE Internet Computing  
A Middleware Approach By separating binding concerns from application logic, the Colomba approach exploits metadata to let mobile applications adapt to dynamic environments.  ...  When a user with a mobile terminal (MT) requests to start an MNS session, the system assigns a dedicated shadow proxy Proxy-ID.  ...  The system provides any portable device with a companion middleware proxy -a shadow proxy -that autonomously acts on its behalf.  ... 
doi:10.1109/mic.2003.1189187 fatcat:i6wcdgcigfhvxcxbw5qicwhob4

A software exoskeleton to protect and support citizen's ethics and privacy in the digital world

Marco Autili, Davide Di Ruscio, Paola Inverardi, Patrizio Pelliccione, Massimo Tivoli
2019 IEEE Access  
The digital systems that surround them are increasingly able to make autonomous decisions over and above them and on their behalf.  ...  They feel that their moral rights, as well as the social, economic, and political spheres, can be affected by the behavior of such systems.  ...  INTRODUCTION In their ordinary life, citizens in the digital world continuously interact with software systems, e.g., by using a mobile device or from on board of a (autonomous) car.  ... 
doi:10.1109/access.2019.2916203 fatcat:vjtwepbj4ndz5kek6fta3luxu4

Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone [article]

Wenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang
2014 arXiv   pre-print
This study may inspire application developers and researchers rethink that zero permission doesn't mean safety and the speaker can be treated as a new attack surface.  ...  Previous research about sensor based attacks on Android platform focused mainly on accessing or controlling over sensitive device components, such as camera, microphone and GPS.  ...  Android OS uses a permission mechanism to enforce restrictions on the specific operations that a particular process can perform.  ... 
arXiv:1407.4923v1 fatcat:y6662hcsunbxxdyfenack53wk4

Autonomic communication services: a new challenge for software agents

Raffaele Quitadamo, Franco Zambonelli
2008 Autonomous Agents and Multi-Agent Systems  
The continuous growth in ubiquitous and mobile network connectivity, together with the increasing number of networked devices populating our everyday environments, call for a deep rethinking of traditional  ...  On this basis, we survey and compare different approaches, and eventually try to synthesize the key desirable characteristics that one should expect from a general-purpose component model for autonomic  ...  deep rethinking of traditional communication and service architectures.  ... 
doi:10.1007/s10458-008-9054-9 fatcat:qafcewl36jeczc37ywe5rs4hky

Blockchain Application for the Paris Agreement Carbon Market Mechanism—A Decision Framework and Architecture

Marco Schletz, Laura A. Franke, Søren Salomo
2020 Sustainability  
We outline a system architecture that allows the linking of the heterogeneous systems, the integration of an Article 6.2 exchange mechanism, and the progress tracking of climate targets.  ...  This paper evaluates the suitability of blockchain technology for the Article 6.2 carbon market mechanism of the Paris Agreement.  ...  Instead, we need to 'rethink and redesign' the Article 6.2 mechanism architecture.  ... 
doi:10.3390/su12125069 fatcat:2v76omtdqffyfal5syvh7lzjdi

Serious Games: An Attractive Approach to Improve Awareness [chapter]

Silvio Sorace, Elisabeth Quercia, Ernesto La Mattina, Charalampos Z. Patrikakis, Liz Bacon, Georgios Loukas, Lachlan Mackinnon
2018 Community-Oriented Policing and Technological Innovations  
The Pandora + training tool is a cloud-based client-server system which runs on a desktop or mobile device.  ...  in community policing mechanisms and fostering citizen engagement.  ... 
doi:10.1007/978-3-319-89294-8_1 fatcat:r53cuqc7kbgoncxh7zn5ikcpqm
« Previous Showing results 1 — 15 out of 11,190 results