Functionalities as superior predictor of applications privacy threats

被引:0
作者
De Santo, Alessio [1 ]
Quiquerez, Brice [1 ]
Gaspoz, Cedric [1 ]
机构
[1] HES SO Univ Appl Sci Western Switzerland, HEG Arc, Informat Syst & Management Inst, Neuchatel, Switzerland
来源
NEW ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1 | 2016年 / 444卷
关键词
threatening application; privacy; malware; user privacy concerns; AGREEMENT;
D O I
10.1007/978-3-319-31232-3_25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Applications are invading our devices whether in our phones, computers and TVs or in our cars, appliances and cameras. Providing great benefits in terms of added functionalities and customization, these applications also put a lot of pressure on our privacy. In order to offer their services, these applications needs access to data stored on the devices or captured by various sensors. Currently all systems have implemented a permissions based framework for granting access to various data, based on the requests made by the applications. However, it is difficult for most users to make informed decisions when they are asked to grant these accesses. In this paper, we present a paradigm shift from a permissions to a functionalities framework. We show that users are consistent in understanding functionalities offered by applications and we propose an ontology for bridging the gap between understandable functionalities and technical permissions.
引用
收藏
页码:263 / 274
页数:12
相关论文
共 30 条
[1]   A transdisciplinary ontology of innovation governance [J].
Adams, Wendy .
ARTIFICIAL INTELLIGENCE AND LAW, 2008, 16 (02) :147-174
[2]  
[Anonymous], 2012, P 2 ACM WORKSHOP SEC
[3]  
[Anonymous], 2012, TRUST TRUSTWORTHY CO
[4]  
[Anonymous], 2012, Practical malware analysis: the hands-on guide to dissecting malicious software
[5]  
[Anonymous], 1998, EUR C MACH LEARN
[6]  
Beresford AR, 2011, P 12 WORKSH MOB COMP, P49
[7]  
Blasing Thomas, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P55, DOI 10.1109/MALWARE.2010.5665792
[8]  
Chakradeo S., 2013, P 6 ACM C SEC PRIV W, P13, DOI DOI 10.1145/2462096.2462100
[9]  
Chin E., 2012, Proceedings of the Eighth Symposium on Usable Privacy and Security, P1, DOI [10.1145/2335356.2335358., DOI 10.1145/2335356.2335358, 10.1145/2335356.2335358]
[10]  
Christensen CM, 2007, MIT SLOAN MANAGE REV, V48, P38