2009/dap/policy-reqs Overview.html,1.54,1.55

Update of /sources/public/2009/dap/policy-reqs
In directory hutz:/tmp/cvs-serv7238

Modified Files:
	Overview.html 
Log Message:
update headings for threat case appendix, add additional media threat
for privacy, fix additional validation issues


Index: Overview.html
===================================================================
RCS file: /sources/public/2009/dap/policy-reqs/Overview.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -d -r1.54 -r1.55
--- Overview.html	6 Jan 2011 23:39:06 -0000	1.54
+++ Overview.html	7 Jan 2011 20:06:34 -0000	1.55
@@ -198,9 +198,9 @@
 
 	<p>To establish trust, a few basic parameters may be used, among which:</p>
 	<ul>
-	  <li>identity — ensuring that the privileges are granted to the application from the trusted provider itself, to avoid phishing attacks;</li>
-	  <li>reputation — if others have reviewed positively an application, the user is more likely to trust it; reputation is itself linked to identity, either as a way to identify the source of the recommandation (e.g. approval from a network operator), or as a way to identify the aggregator of recommendations;</li>
-	  <li>context — a user is more likely to trust an application that requests permissions that make sense to her use of the said application.</li>
+	  <li><dfn>identity</dfn> — ensuring that the privileges are granted to the application from the trusted provider itself, to avoid phishing attacks;</li>
+	  <li><dfn>reputation</dfn> — if others have reviewed positively an application, the user is more likely to trust it; reputation is itself linked to identity, either as a way to identify the source of the recommandation (e.g. approval from a network operator), or as a way to identify the aggregator of recommendations;</li>
+	  <li><dfn>context</dfn> — a user is more likely to trust an application that requests permissions that make sense to her use of the said application.</li>
 	</ul>
 
         <p>
@@ -246,7 +246,7 @@
 	<p>To that end, it should be possible to describe
 	platform-independent and declarative policies that determine which
 	APIs can be used from what Web site or application.</p> 
-      <section id=delgated-authority-story1-rqmts'>
+      <section id='delgated-authority-story1-rqmts'>
         <h4>Requirements</h4>
 	<ul>
       <li>The access control policy language MUST be device-independent.</li>
@@ -275,7 +275,7 @@
         </p>
 
 	<p>This policy needs to be integrity-protected during various points in its life-cycle.</p>
-      <section id=delgated-authority-story2-rqmts'>
+      <section id='delgated-authority-story2-rqmts'>
         <h4>Requirements</h4>
 	<ul>
       <li>Integrity protection and source authentication of the access
@@ -309,7 +309,7 @@
 possible to transfer or share a 
 representation of user choices across devices at any time.
         </p>
-      <section id=delgated-authority-story3-rqmts'>
+      <section id='delgated-authority-story3-rqmts'>
         <h4>Requirements</h4>
 	<ul>
       <li>Access control policy MUST be able to record user decisions
@@ -388,7 +388,7 @@
           and the size of the mobile market increases.
         </p>
         <section id="premium-rate-abuse">
-          <h2>Abuse Case AC1: Premium Rate Abuse</h2>
+          <h2>Premium Rate Abuse</h2>
           <p>A widget that seems benign but is actually spewing out
           SMSs to premium rate numbers without the user’s
           knowledge. This could be modified from an original safe
@@ -403,7 +403,7 @@
           </p>
         </section> <!-- premium rate Abuse -->
         <section id="privacy-breach">
-          <h3>Abuse Case AC2: Privacy Breach</h3>
+          <h3>Privacy Breach</h3>
           <p>An application that gains access to locations, contacts
           and gallery, silently uploading the data in the background
           to a site owned by the attacker. This is something that
@@ -425,9 +425,13 @@
           the knowledge that their personal data will not leak in
           any way. 
           </p>
+<p>
+Another example is turning on the camera or audio remotely to obtain
+audio, video or photo information without permission.
+</p>
         </section> <!-- privacy-breach -->
         <section id="integrity-breach">
-          <h3>Abuse Case AC3: Integrity Breach</h3>
+          <h3>Integrity Breach</h3>
           <p>A widget that replaces the voicemail number with a
           premium rate number instead? There are number of reasons
           why an attacker would want to breach the integrity of
@@ -449,7 +453,7 @@
           </p>
         </section> <!-- integrity-breach -->
         <section id="phishing">
-          <h3>Abuse Case AC4: Phishing</h3>
+          <h3>Phishing</h3>
           <p>
             Widgets contain web content making it is easy to duplicate
             and masquerade as something legitimate… perhaps a bank? 

Received on Friday, 7 January 2011 20:06:37 UTC