dc.contributor.author | Hasu, Tero | eng |
dc.contributor.author | Bagge, Anya Helene | eng |
dc.contributor.author | Haveraaen, Magne | eng |
dc.date.accessioned | 2014-12-11T14:00:54Z | |
dc.date.available | 2014-12-11T14:00:54Z | |
dc.date.issued | 2013 | eng |
dc.Published | In: Nielson, H. R., Gollmann, D. (eds.). Secure IT Systems: 51-66 | en_US |
dc.identifier.isbn | 978-3-642-41487-9 | en_US |
dc.identifier.issn | 0302-9743 | en_US |
dc.identifier.uri | https://hdl.handle.net/1956/8916 | |
dc.description.abstract | Permission-based security models are common in smartphone operating systems. Such models implement access control for sensitive APIs, introducing an additional concern for application developers. It is important for the correct set of permissions to be declared for an application, as too small a set is likely to result in runtime errors, whereas too large a set may needlessly worry users. Unfortunately, not all platform vendors provide tools support to assist in determining the set of permissions that an application requires. We present a language-based solution for permission management. It entails the specification of permission information within a collection of source code, and allows for the inference of permission requirements for a chosen program composition. Our implementation is based on Magnolia, a programming language demonstrating characteristics that are favorable for this use case. A language with a suitable component system supports permission management also in a cross-platform codebase, allowing abstraction over different platform-specific implementations and concrete permission requirements. When the language also requires any “wiring” of components to be known at compile time, and otherwise makes design tradeoffs that favor ease of static analysis, then accurate inference of permission requirements becomes possible. | en_US |
dc.language.iso | eng | eng |
dc.publisher | Springer | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science; 8208 | en_US |
dc.subject | language-based security | eng |
dc.subject | platform security architectures | eng |
dc.subject | security management | eng |
dc.subject | Software engineering | eng |
dc.title | Inferring Required Permissions for Statically Composed Programs | en_US |
dc.type | Chapter | |
dc.type | Peer reviewed | |
dc.date.updated | 2014-12-11T13:53:34Z | |
dc.description.version | acceptedVersion | en_US |
dc.rights.holder | Copyright 2013 Springer-Verlag Berlin Heidelberg | en_US |
dc.identifier.doi | https://doi.org/10.1007/978-3-642-41488-6_4 | |
dc.identifier.cristin | 1083813 | |