<p>Users share a large amount of information with modern platforms such as web platforms and social platforms for various services. However, they face the risk of information leakage because modern platforms still lack proper security policies. Existing security policies, such as permission systems and isolation, can help regulate information sharing. However, these policies have problems, such as coarse granularity, bad usability, and incompleteness, especially when new features are introduced. I investigate the security impacts of new features in web and mobile platforms and find design problems that lead to user information leakage. Based on these analyses, I propose design principles for permission systems that mediate how information s...
Abstract. Most social networks have implemented extensive and com-plex privacy controls in order to ...
Internet of Things applications have the potential to derive sensitive information about individuals...
Internet of Things applications have the potential to derive sensitive information about individuals...
Users share a large amount of information with modern platforms such as web platforms and social pla...
Thesis (Ph.D.)--University of Washington, 2014Today's computer users have the choice among an ever i...
Thesis (Ph.D.)--University of Washington, 2014Today's computer users have the choice among an ever i...
How can we, as platform designers, protect computer users from the threats associated with malicious...
As the wealth of quality application services grows, so too does the volume of data that users disc...
Recent technological advancements have enabled the collection of large amounts of personal data of i...
Today’s computer users have the choice among an ever increasing variety of devices and platforms, in...
On the internet today, everything is centralized. For most people, a single commercial entity owns t...
Technology has long facilitated our lives. Nowadays, we increasingly embrace living in digital space...
Technical improvements of Web and location technologies have fostered the development of online appl...
Web2.0 applications have become an inherent part of everyday life, with unpredictable consequences f...
In a modern society highly focused on digital services, online communities, such as Online Social Ne...
Abstract. Most social networks have implemented extensive and com-plex privacy controls in order to ...
Internet of Things applications have the potential to derive sensitive information about individuals...
Internet of Things applications have the potential to derive sensitive information about individuals...
Users share a large amount of information with modern platforms such as web platforms and social pla...
Thesis (Ph.D.)--University of Washington, 2014Today's computer users have the choice among an ever i...
Thesis (Ph.D.)--University of Washington, 2014Today's computer users have the choice among an ever i...
How can we, as platform designers, protect computer users from the threats associated with malicious...
As the wealth of quality application services grows, so too does the volume of data that users disc...
Recent technological advancements have enabled the collection of large amounts of personal data of i...
Today’s computer users have the choice among an ever increasing variety of devices and platforms, in...
On the internet today, everything is centralized. For most people, a single commercial entity owns t...
Technology has long facilitated our lives. Nowadays, we increasingly embrace living in digital space...
Technical improvements of Web and location technologies have fostered the development of online appl...
Web2.0 applications have become an inherent part of everyday life, with unpredictable consequences f...
In a modern society highly focused on digital services, online communities, such as Online Social Ne...
Abstract. Most social networks have implemented extensive and com-plex privacy controls in order to ...
Internet of Things applications have the potential to derive sensitive information about individuals...
Internet of Things applications have the potential to derive sensitive information about individuals...