Fine-grained reasoning about the security and usability trade-off in modern security tools
نویسندگان
چکیده
OF DISSERTATION Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Computer Science The University of New Mexico Albuquerque, New Mexico
منابع مشابه
Trade and National Security: A Test for Best-Known Hypothesis
National security depends on soft power, the ability of a country to generate and use its economic power and to project its national values. It also depends on long-term factors that contribute to economic growth and increase the total resources base available not only for defense but to provide economic security in the form of income and business opportunities for individuals. The economic iss...
متن کاملThere's Something Stuck In My Shoe! Reflections on the adoption of fine and course grained authorization frameworks
A usable system has many layers. There is the end-users’ experience through web sites, interactive voice response systems, ATMs, etc. Below these interfaces are the tools and technologies to create and operate these systems. Security of deployed systems is often dependent on the functionality and usability of these underlying technologies. This paper focuses on usability issues surrounding thes...
متن کاملUsing composition and refinement to support security architecture trade-off analysis
This paper demonstrates thatcompositionand refinement techniques are a promising solution for performing rigorous, security architecture trade-off analysis. Such analysis typically occurs in one of two forms: comparing two architectures for implementation and determining the impact of change to an implemented architecture. Composition and refinement techniques reduce the overhead of such analys...
متن کاملSecurity and Performance Trade-off in PerfCloud
Both cloud and GRID are computing paradigms that manage large distributed resources, and currently there is a lot of interest in their integration. An integrated architecture cloud-GRID requires fine-grained access control and identity federation among untrusted distributed domains in the cloud. This paper deals with the trade-off between security and performance in such architectures, comparin...
متن کاملPScout : Analyzing the Android Permission Specification by Kathy Wain Yee Au
PScout: Analyzing the Android Permission Specification Kathy Wain Yee Au Master of Applied Science Graduate Department of Electrical and Computer Engineering University of Toronto 2012 Modern smartphone operating systems (OSs) have been developed with a greater emphasis on security and protecting privacy. One of the security mechanisms these systems use is permission system. We perform an analy...
متن کامل