Login / Signup
AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems.
Talia Ringer
Dan Grossman
Franziska Roesner
Published in:
CCS (2016)
Keyphrases
</>
operating system
user driven
access control
fine grained
end users
data security
security mechanisms
computer systems
security policies
access control policies
role based access control
databases
security requirements