[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1572532.1572552acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

How users use access control

Published: 15 July 2009 Publication History

Abstract

Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requires more user effort. We want to understand what level of control users need over their data, by examining what sorts of access policies users actually create in practice.
We used automated data mining techniques to examine the real-world use of access control features present in standard document sharing systems in a corporate environment as used over a long (> 10 year) time span. We find that while users rarely need to change access policies, the policies they do express are actually quite complex. We also find that users participate in larger numbers of access control and email sharing groups than measured by self-report in previous studies. We hypothesize that much of this complexity might be reduced by considering these policies as examples of simpler access control patterns. From our analysis of what access control features are used and where errors are made, we propose a set of design guidelines for access control systems themselves and the tools used to manage them, intended to increase usability and decrease error.

References

[1]
]]S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman, and R. Nair. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing. In CHI '07: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 357--366, New York, NY, USA, 2007. ACM.
[2]
]]X. Cao and L. Iverson. Intentional access management: making access control usable for end-users. In SOUPS '06: Proceedings of the second symposium on Usable privacy and security, pages 20--31, New York, NY, USA, 2006. ACM.
[3]
]]M. Corporation. Best practices for permissions and user rights, January 2005. http://technet.microsoft.com/en-us/library/cc779601.aspx.
[4]
]]D. Ferraiolo and R. Kuhn. Role-based access controls. In 15th NIST-NCSC National Computer Security Conference, pages 554--563, 1992.
[5]
]]Flickr. http://www.flickr.com.
[6]
]]N. S. Good and A. Krekelberg. Usability and privacy: a study of kazaa p2p file-sharing. In CHI '03: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 137--144, New York, NY, USA, 2003. ACM Press.
[7]
]]H. Krawczyk, M. Bellare, and R. Canetti. RFC 2104: HMAC: Keyed-hashing for message authentication, Feb. 1997. Status: INFORMATIONAL.
[8]
]]S. T. K. Lam and E. Churchill. The social web: global village or private cliques? In DUX '07: Proceedings of the 2007 conference on Designing for User eXperiences, pages 1--7, New York, NY, USA, 2007. ACM.
[9]
]]E. Lieberman and R. C. Miller. Facemail: showing faces of recipients to prevent misdirected email. In SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and security, pages 122--131, New York, NY, USA, 2007. ACM.
[10]
]]R. A. Maxion and R. W. Reeder. Improving user-interface dependability through mitigation of human error. Int. J. Hum.-Comput. Stud., 63(1--2):25--50, 2005.
[11]
]]A. D. Miller and W. K. Edwards. Give and take: a study of consumer photo-sharing culture and practice. In CHI '07: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 347--356, New York, NY, USA, 2007. ACM.
[12]
]]J. S. Olson, J. Grudin, and E. Horvitz. A study of preferences for sharing and privacy. In CHI '05: CHI '05 extended abstracts on Human factors in computing systems, pages 1985--1988, New York, NY, USA, 2005. ACM.
[13]
]]R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter, K. Bacon, K. How, and H. Strong. Expandable grids for visualizing and authoring computer security policies. In CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pages 1473--1482, New York, NY, USA, 2008. ACM.
[14]
]]J. Rode, C. Johansson, P. DiGioia, R. S. Filho, K. Nies, D. H. Nguyen, J. Ren, P. Dourish, and D. Redmiles. Seeing further: extending visualization as a basis for usable security. In SOUPS '06: Proceedings of the second symposium on Usable privacy and security, pages 145--155, New York, NY, USA, 2006. ACM Press.
[15]
]]R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38--47, 1996.
[16]
]]S. Voida, W. K. Edwards, M. W. Newman, R. E. Grinter, and N. Ducheneaut. Share and share alike: exploring the user interface affordances of file sharing. In CHI '06: Proceedings of the SIGCHI conference on Human Factors in computing systems, pages 221--230, New York, NY, USA, 2006. ACM.
[17]
]]T. Whalen, D. Smetters, and E. F. Churchill. User experiences with sharing and access control. In CHI '06: CHI '06 extended abstracts on Human factors in computing systems, pages 1517--1522, New York, NY, USA, 2006. ACM.
[18]
]]M. E. Zurko, R. Simon, and T. Sanfilippo. A user-centered, modular authorization service built on an RBAC foundation. In IEEE Symposium on Security and Privacy, pages 57--71, 1999.
[19]
]]M. E. Zurko and R. T. Simon. User-centered security. In C. Meadows, editor, New Security Paradigms Workshop. ACM, 1996.

Cited By

View all
  • (2024)Cognition Behind Access Control: A Usability Comparison of Rule- and Category-Based MechanismsICT Systems Security and Privacy Protection10.1007/978-3-031-65175-5_26(367-380)Online publication date: 26-Jul-2024
  • (2023)Effective Collaboration in the Management of Access Control Policies: A Survey of ToolsIEEE Access10.1109/ACCESS.2023.324286311(13929-13947)Online publication date: 2023
  • (2023)Maintain High-Quality Access Control Policies: An Academic and Practice-Driven ApproachData and Applications Security and Privacy XXXVII10.1007/978-3-031-37586-6_14(223-242)Online publication date: 12-Jul-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
SOUPS '09: Proceedings of the 5th Symposium on Usable Privacy and Security
July 2009
205 pages
ISBN:9781605587363
DOI:10.1145/1572532

Sponsors

  • Carnegie Mellon CyLab
  • Google Inc.

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 July 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access control
  2. file sharing
  3. usability

Qualifiers

  • Research-article

Conference

SOUPS '09
Sponsor:
SOUPS '09: Symposium on Usable Privacy and Security
July 15 - 17, 2009
California, Mountain View, USA

Acceptance Rates

SOUPS '09 Paper Acceptance Rate 15 of 49 submissions, 31%;
Overall Acceptance Rate 15 of 49 submissions, 31%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)45
  • Downloads (Last 6 weeks)6
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Cognition Behind Access Control: A Usability Comparison of Rule- and Category-Based MechanismsICT Systems Security and Privacy Protection10.1007/978-3-031-65175-5_26(367-380)Online publication date: 26-Jul-2024
  • (2023)Effective Collaboration in the Management of Access Control Policies: A Survey of ToolsIEEE Access10.1109/ACCESS.2023.324286311(13929-13947)Online publication date: 2023
  • (2023)Maintain High-Quality Access Control Policies: An Academic and Practice-Driven ApproachData and Applications Security and Privacy XXXVII10.1007/978-3-031-37586-6_14(223-242)Online publication date: 12-Jul-2023
  • (2022)Weaving Privacy and PowerProceedings of the ACM on Human-Computer Interaction10.1145/35555746:CSCW2(1-33)Online publication date: 11-Nov-2022
  • (2022)On the Analysis of MUD-Files’ Interactions, Conflicts, and Configuration Requirements Before DeploymentThe Fifth International Conference on Safety and Security with IoT10.1007/978-3-030-94285-4_9(137-157)Online publication date: 8-Jan-2022
  • (2021)Making Access Control Easy in IoTHuman Aspects of Information Security and Assurance10.1007/978-3-030-81111-2_11(127-137)Online publication date: 8-Jul-2021
  • (2020)Measuring the Usability of Firewall Rule SetsIEEE Access10.1109/ACCESS.2020.29710938(27106-27121)Online publication date: 2020
  • (2019)Consumer Smart HomesProceedings of the 20th International Workshop on Mobile Computing Systems and Applications10.1145/3301293.3302371(117-122)Online publication date: 22-Feb-2019
  • (2019)Multitenant Access Control for Cloud-Aware Distributed FilesystemsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2017.271583916:6(1070-1085)Online publication date: 1-Nov-2019
  • (2019)Web-application Security Evaluation as a Service with Cloud Native Environment Support2019 International Conference on Advancements in Computing (ICAC)10.1109/ICAC49085.2019.9103414(357-362)Online publication date: Dec-2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media