Bestand wählen
Merken

Multi-user support in an embedded secured environment

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
and over 1 to everyone in the army OK once hey so my neighbors didn't say on I'm going to present you around all we on user support in an embedded secure environmental entice and free automotive if all of those this politicians who should have been given by the sum RJT with 1 of my co but couldn't make it here so I'm replacing the so i'm gonna 1st introduce or what was it is a news for in-vehicle infotainment on then I explain it was about of of the of the solution we use in and How are we be refusal management so what are the different kind of feudal we have our we every specification framework which is is a is a main parts of the most important part of a weak van told about so all we are on the the differences in a job on the especially older remove from 1 state to another so when we talk a bit about the resource management on for example or Wi-Fi reduce everything and what of someone to connect them as a device and things and I make an honest summarize about the what is the status of implementation what works what remains to be done on others will confusion to to summarize what I said before the
so so the mother may need for IVI is that MedISys by is women we need to add several user but are going to to use the system at the same time and so we have 1 user on 1 state with 1 decision so what we will absolutely so you decisions separation we don't want the user to rest we thought the content and applications don't we need to be able to manage privilege we have new to user would we which we are more privileged to work to put 4 configure on some of the resources and that we need to what we need to know to manage the peripheral hours for life fiber tools but they can also be our USB ports 0
so you the management of we have 3 types of shows the we have the privileged user regular users on getting so the privileges of course is the 1 who was kind of C and traitor is able to recycle application communication and accessible to all users which really good I can this ever can use common applications users can also is that application but now there will be only user application if a user % integration you can only use it on was the user cannot access it can't use it on I'm regret is I said before can use commodification on this user is a bit better because it's the user you have the following so it as a very restricted rejected access to our to application of for example the guest user will be able to turn on of the radio but maybe you won't be able to work or figure it out into stations and of course but if we have a of user with separated in use of runs the 1st of its application we have separated the reasons to manage application on the packages of that is is a difference between the by age and an application that the bycatch heckled and several applications I like it is is really is exact edge into 2 dominant silence system I mean you can have several fissures in 1 package the on we're getting back into application will baggage station world we have what is called pristane presenting in fact it means we are going to cookie is on the like age from a shared area to user area basically use area is is all officials as on all the on the things grouping of eyes on of the cities of that that we have but that is for spec agents applications on when we want to is that it we will use a PKG Cindy command story instead applications so we can answer the of every application is unique in fact gone to user cannot exist at the exact same applications that but that person will be the same the battery everyone that which 1 of you that it should it choose a reality and in his own directory so we need to have a unique application idea so you we are the username his education of IT ons application idea instead composed of a package ID and education all about the
packaging station of we we have different type of the cages and dies and to be wgt uh xpk the habitat for on a web application that the difference between the 2 is that it's pretty and useful for so the causal application was what is a web runtime and I and that's what we want is to have only 1 of the status followers of the difference in the different package is so we're using a prodigious Cindy oncogene Eduserv all we then use different backends 2 examples with different packages and open the if you can see that not only a few steps different from Beckett for to a package from another of which is people perceive it and conclusions of the archive which get quite ability in a different format on the manifest busses every area like each other manifest by manifest it's just john John text by it could be used on XML on it contains the application name on several of in information that I needed to send the package so here we can either extended just on so we need different busses on going to geneticin when it came to its very tragic rhetoric to a web application because when you location-aware activation before the application to the use of weapons and so and so on so what was new on so you feel binary we want these applications will be so the web runtime and I but we then loaded subjugation the and this is the main motivation then that is to manage security independently of the of the package you want to go to a uniformization of our forefathers the security so if you are the new and new on and you kind of like age it's the statutory under the same way for all packages which on
so here uh there was but you can see it as a bucket manager server on the different back on over interact with this achievement is the sagitta manager 7 is a world of the sector to manage a set that is to say the of Fisher at 11 under fives so a right now I'm not sure it's something that but is used by convinced that if you have a set but in the end we came out of the sector to managers are being with a set of images is is the lab and for the security that that I used to to the user from from using I know that use application for example when come to launching applications on his own Schwartz was applications on the we communicate was indeed among so indeed we demand we know all what what users who which you which uses formances education uh asking for it around communicating with any decision urgent every user or when you know for it's user sessions launch and indecision agitation was is to communicate with the energy demand and then we can see that on the and you will we know which application that that is it has to use depending on which is the lowest application so long as the state of the art is iterative images it's to be able to switch from 1 to 1 city to another without losing its application with without having to reload the degree of which is what I checked and with it on this of so also when we you when you switch from 1 to 2 as unit to be able uh to prevent user from attacking with another user content so we in we give the user sessions separated so these are the some of the 1 when session is not a decision that is shared amongst users but we use only 1 western service for users so far to to achieve that we just of just imagine to have a big display on display are separated into several the area on was area are also displayed on the screen of the users on the prevalence of cytosol also subjugation from meeting it was area on like that we can the switch over from 1 city to another we just have to move the subjugation from 1 area to another around us Osijek application framework should be it should be the 1 who who was who wrote to move application from as a for Western so there's only 1 each with 4 as manager management is to a manageable conflicts for example the 1 user want to set about variety of Wi-Fi device on as the ones that another IP and we need a way to prevent that issue so what the solution is quite simple engenders to of only 1 privileges but can few right of units which is kind of decision is thought of as I said before but then as the owners of the thing that needs to be taken into into account that is to defend shared on to diverse resources from example of if I iconic my phone with good tools for is my thighs I maybe I'd want to to shape it will user or not and 1 event to access on developing Lewis was it was a case where you want to share it so anybody can access so we need to have a way to put your life and to provide a rich user acts can access what so down the summarize what what has been done on than what remains to be done so we remove old get up to the past the UID in GATE application and that application where running with up the name use enabling them to up almost everything has been removed because it has to go somewhere develop that idea batch so instead of this job we're getting situation management we don't have a smart that from a legacy goes from things and to but because security framework to they change from things into the 2003 on the other like no we fit we define prevail in the privileged user of was gender system in fact if the user is part of the system were because they aim at him as the as of religions but that's a word recognition engine quick easy but feel like a choice that has been made to equip choice of has been made that it's not it's not that something that got money changed I got the user that that is of no and that the bases are separated so issues arise on that is is getting its application in its own directory on the on commodification of our database that is not accessible to affected will initially on the other binary to a tumor and to initialize at the basis of the only walking as a CAP I about Sakaki I know of is duplicated of functionally into and 2 application management we have as 1 we had before on that is exact same 1 but we had the UID so you we can pass on the user ID to on to the package managers as this needed because a lot of Damon irony has worked so if you get if you want to get the idea of who is using it it should get assurances get UID which is against which I did not do any of you know let's way need to to pass it as a parameter when you could uh got API functions our own there is a which is a feature is always competing in intermediate packages are we I we talk about that later on given example along the so we can use these settlements education it gives the example of a 2 2 and 7 application on to launch ships so this Cindy's as the command line of the force is useful for the so what remains to be done on so this is a display management is is not quite and units of example we would like to as the privileges of the were being able to move the annotation from 1 district to 1 another Polish Jack directly in education and in the use of display of a simple use case would be out of about a parent wants to stick to the Bayview for side we systems back so he doesn't want
to too much on the screen but on the screen of his children 0 so should the management of we need 2 6 Quick permissions right now so I think such to manager is almost gone so it should be seen on a show that the big between education policy package right not a replication of iterated from on 1 another on what application that so it is isolated so what we we want to do is to show that the unification of the same package but only from the same package a really media center I said it on was on factor of it's possible to want to use it a new material said that if you are a regular user but not as a as a common application so what remains to be done as manager is that that have been used for quantification of images and so the order would use a feature in the occasionally done which means of we to manage that basement mainly what effect city that local to set up such you have a property on reducible to sustain and so on and so on so mean maybe some of difficult task a right not only the 1st that is done you can connect your phone on the when you when you know we have access to it hey but a lot of things to do to prove that remains to be done for example of sharing sharing it with other people on the state of the of a difficult task which which remain to be done on the wine it is not there yet us all a ready for the so it is the example of the of the media media package on in fact what changed between which users will what we have right now on what we had before is that right now we have to that is but in the use of before we had only 1 that that based on the we didn't others this chapter and media consensus simple function but where the data is so in fact we have only our it what it was like if 1 only 1 user on everybody was using the same thing the same database the on just 1 information so they just 7 managers of your your media library so me just and unjust stand for all the files on major phonetic from the traits of edges of of of the major you the so I had to go through yeah all of again is on that what we need to to work on 4 of them so we separated the user sessions with an individual Byron and so we can share 1 session for everybody all 1 common environments so we have a base in without the Bayes a petition for every user but so we have 1 western cities In order to move from 1 to 2 orders the on a peripheral management is done mainly by provided user but we can allocate user of data resource for special uses a we and the sum of some cultural to another user on a re regarding provisional components here we have a situation manager of which give of emission access to some Phys 2 or find that will find out of the situation added on March 11 sigh and its to to to also of preventing users from mention education or even just reading the so I put those those documentation regarding the its user on those occasions from what we have on the on the wiki but from the technical question of very precise knowledge of based on you are so birds along all to getting bored of IPUs as the this is very active so just ask you haven't so very very quickly the and if you have any question I'm ready to yes on the whole I item because the yes he I don't think we use standard containers I'm not sure about 2 a namespaces In fact I didn't work much on to user so I don't have was the technical details about its but what about the question but data but then ask and the meaning is that the if I like and I know so people are working with so maybe I can uh which in contact with another question yes sorry I don't you however some question technically yes yes you you can have more than 1 than the the average of all OQ from having 1 more than 1 but you end up having the same issue whether we were trying to prevent for example if you have 2 privileges have been at that same time on the book want to change the IP address of the Y I phi of the ice you and up use the same issue right before so it would be better to have only 1 privileges but there's nothing right now but and forces the that was here yeah of the I think this is the so the AEC is sort of a man is fragile I want to you can become a provisions I got in fact you good because you then you dense data joined the system will but you know inner product of is I think don't think so will the welcome to move 1 regular user to provisions I think 1 of privileges of much of at the beginning on that he would call for everything else yes can you provide that the I mean I there may be a region to the what is the best but it uh
in fact when a user launches an application in can launch an application of following that connect to a demon and I run as words so if you if you use them and these rights that are specific to this user distilled white witches arms applications so where to put the that we want to put it into all so but the demon as no no way to know which is an unseen so we have to pass the perky I The White as the user so there were no which user of most the studies in which is the lowest so where to put about in which on directors and the reason because the advisable for me to come out of 1 that is the 1 for each user position is 1 that is the model for 1 the 1 the device you are invited everything just with your ideas you use idea so if if anyone wants to talk more about that all ties and that's better than you to because there was a lot of the what do you want a wouldn't after the outside of the world thank you for your attention and
Umwandlungsenthalpie
Bit
Subtraktion
Multiplikation
Gewichtete Summe
Datenmanagement
Implementierung
Infotainment
Programmierumgebung
Framework <Informatik>
Ordnungsreduktion
Datenmanagement
Prozess <Informatik>
Mereologie
Aggregatzustand
Telekommunikation
Subtraktion
Multiplikation
Ablöseblase
Datenmanagement
Kartesische Koordinaten
Datenhaltung
Spezialrechner
Physikalisches System
Datenmanagement
Regulärer Graph
Typentheorie
Datentyp
Arbeitsplatzcomputer
Inhalt <Mathematik>
Urbild <Mathematik>
Konfigurationsraum
Peripheres Gerät
Trennungsaxiom
Videospiel
Eindeutigkeit
Physikalisches System
Programmierumgebung
Entscheidungstheorie
Integral
Flächeninhalt
Cookie <Internet>
Eindeutigkeit
Verzeichnisdienst
Aggregatzustand
Datensichtgerät
Web-Applikation
Versionsverwaltung
Datenmanagement
NP-hartes Problem
Kartesische Koordinaten
Eins
Freeware
Datenmanagement
Einheit <Mathematik>
Prozess <Informatik>
Uniforme Struktur
Computersicherheit
Stützpunkt <Mathematik>
Auswahlaxiom
Parametersystem
Lineares Funktional
Datenhaltung
Computersicherheit
Güte der Anpassung
Programmierumgebung
Mustererkennung
Ereignishorizont
Entscheidungstheorie
Kugelkappe
Dienst <Informatik>
Diskrete-Elemente-Methode
Verknüpfungsglied
Forcing
Menge
Rechter Winkel
Geschlecht <Mathematik>
Server
Ablöseblase
Dateiformat
Information
Verzeichnisdienst
Varietät <Mathematik>
Aggregatzustand
Subtraktion
Multiplikation
Interaktives Fernsehen
Kugelkappe
Dienst <Informatik>
Framework <Informatik>
Datensichtgerät
Hypermedia
Benutzerbeteiligung
Front-End <Software>
Front-End <Software>
Datentyp
Arbeitsplatzcomputer
Vererbungshierarchie
Fünf
Inhalt <Mathematik>
Parallele Schnittstelle
Disjunktion <Logik>
Bildgebendes Verfahren
Touchscreen
Videospiel
Konfigurationsraum
Rechenzeit
Physikalisches System
Packprogramm
Energiedichte
Minimalgrad
Flächeninhalt
Touchscreen
Basisvektor
Mereologie
ICC-Gruppe
Wort <Informatik>
Stapelverarbeitung
Betriebsmittelverwaltung
Wiki
Server
Multiplikation
Gewichtete Summe
Kontrollstruktur
Datenmanagement
Kartesische Koordinaten
Dienst <Informatik>
Netzadresse
Datenhaltung
Task
Service provider
Hypermedia
Datenmanagement
Mittelwert
Datenreplikation
Computersicherheit
Programmbibliothek
Zusammenhängender Graph
Parallele Schnittstelle
Disjunktion <Logik>
Bildgebendes Verfahren
Touchscreen
Metropolitan area network
Soundverarbeitung
Lineares Funktional
Namensraum
Architektur <Informatik>
Theoretische Physik
Datenhaltung
Quantifizierung
Programmierumgebung
Physikalisches System
Skalarproduktraum
Teilbarkeit
Quick-Sort
Arithmetisches Mittel
Diskrete-Elemente-Methode
Rechter Winkel
Hypermedia
Information
Ordnung <Mathematik>
Programmierumgebung
Standardabweichung
Aggregatzustand
Beobachtungsstudie
Server
Multiplikation
Ortsoperator
Datenmanagement
Kartesische Koordinaten
Programmierumgebung
Datenhaltung
Service provider
Informationsmodellierung
Rechter Winkel
Typentheorie
Wort <Informatik>
Dämon <Informatik>

Metadaten

Formale Metadaten

Titel Multi-user support in an embedded secured environment
Untertitel Practical return of experience from Tizen 3 in Automative
Alternativer Titel Embedded - Embedded Multiuser
Serientitel FOSDEM 2015
Autor Thierry, Kévin
Lizenz CC-Namensnennung 2.0 Belgien:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
DOI 10.5446/34373
Herausgeber FOSDEM VZW
Erscheinungsjahr 2016
Sprache Englisch
Produktionsjahr 2015

Inhaltliche Metadaten

Fachgebiet Informatik

Ähnliche Filme

Loading...
Feedback