Location of Repository

I’m Allowing What? Disclosing the authority applications demand of users as a condition of installation

By Jennifer Tam, Robert W. Reeder and Stuart Schechter


Computer operating systems, and now websites that serve as application platforms, are increasingly adopting stricter application security models; they restrict the resources applications can access to those authorized by the user. Users are asked to authorize access to these resources either when the application is installed or when previously-unauthorized resources are required. For example, Facebook requires its 400+ million users to make authorization decisions whenever an application first tries to run within a user’s account. The Android mobile phone OS requires its millions of users to make application authorization decisions when downloading new applications. While the security of these users ’ systems and data increasingly rests on their ability to make these authorization decisions, there is little research to guide thos

Year: 2011
OAI identifier: oai:CiteSeerX.psu:
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://research.microsoft.com/... (external link)
  • Suggested articles

    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.