首页> 外文会议>Annual CHI Conferenceon Human Factors in Computing Systems >Crowdsourced Exploration of Security Configurations
【24h】

Crowdsourced Exploration of Security Configurations

机译:众群安全配置探索

获取原文

摘要

Smartphone apps today request permission to access a multitude of sensitive resources, which users must accept completely during installation (e.g., on Android) or selectively configure after installation (e.g., on iOS, but also planned for Android). Everyday users, however, do not have the ability to make informed decisions about which permissions are essential for their usage. For enhanced privacy, we seek to leverage crowdsourcing to find minimal sets of permissions that will preserve the usability of the app for diverse users. We advocate an efficient 'lattice-based' crowd-management strategy to explore the space of permissions sets. We conducted a user study (N = 26) in which participants explored different permission sets for the popular Instagram app. This study validates our efficient crowd management strategy and shows that usability scores for diverse users can be predicted accurately, enabling suitable recommendations.
机译:智能手机应用程序今天请求访问多种敏感资源的许可,用户必须在安装期间完全接受(例如,在Android上)或在安装后选择性地配置(例如,在iOS上,还计划为Android计划)。然而,日常用户没有能力做出关于哪些权限对于他们的使用至关重要的明智决策。为了提高隐私,我们试图利用众多,找到最小的权限,以保留应用程序的可用性,以便为不同的用户提供应用程序的可用性。我们倡导高效的“基于格子的人群管理策略来探索权限集的空间。我们进行了一个用户学习(n = 26),其中参与者为流行的Instagram应用程序探索了不同的权限集。本研究验证了我们有效的人群管理策略,并表明可以准确预测各种用户的可用性分数,实现适当的建议。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号