Creeper: a tool for detecting permission creep in file system access controls
نویسندگان
چکیده
منابع مشابه
Curbing Android Permission Creep
The Android platform has about 130 application level permissions that govern access to resources. The determination of which permissions to request is left solely to the application developer. Users are prompted to approve all application permissions at install time, and permissions are silently enforced at execution time. Although many applications make use of a wide range of permissions, we h...
متن کاملFormal Analysis of Dynamic, Distributed File-System Access Controls
We model networked storage systems with distributed, cryptographically enforced file-access control in an applied pi calculus. The calculus contains cryptographic primitives and supports file-system constructs, including access revocation. We establish that the networked storage systems implement simpler, centralized storage specifications with local access-control checks. More specifically, we...
متن کاملPanache: A Parallel File System Cache for Global File Access
Cloud computing promises large-scale and seamless access to vast quantities of data across the globe. Applications will demand the reliability, consistency, and performance of a traditional cluster file system regardless of the physical distance between data centers. Panache is a scalable, high-performance, clustered file system cache for parallel data-intensive applications that require wide a...
متن کاملA Load Balancing Tool Based on Mining Access Patterns for Distributed File System Servers
In this paper we present a new web based Distributed File System server management tool to perform load balancing across multiple servers. The Distributed File System from Distributed Computing Environment (DCE DFS) is a collection of many file systems mounted onto a single virtual file system space with a single namespace. The tool is based on rule-based data mining techniques and graph analys...
متن کاملNovel Architecture for Controlling File System Access
File system administration directly or indirectly affects all users of computer systems today. In an organization, users interact directly with managed file systems, which provide a means of data storage. Users of on-line services, for example, search engines, social networks, photo and video sharing, web based email, etc., rely on managed file systems indirectly, for storing and accessing data...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cybersecurity
سال: 2019
ISSN: 2523-3246
DOI: 10.1186/s42400-019-0031-1