Context-Centric Security

Users today are unable to use the rich collection of third-party untrusted applications without risking significant privacy leaks. In this paper, the authors argue that current and proposed applications and data-centric security policies do not map well to users' expectations of privacy. In the eyes of a user, applications and peripheral devices exist merely to provide functionality and should have no place in controlling privacy. Moreover, most users cannot handle intricate security policies dealing with system concepts such as labeling of data, application permissions and virtual machines. Not only are current policies impenetrable to most users, they also lead to security problems such as privilege-escalation attacks and implicit information leaks.

Provided by: Institute of Electrical & Electronic Engineers Topic: Security Date Added: Jul 2012 Format: PDF

Find By Topic