In the eye of the beholder: A visualization-based approach to information system security

Computer system security is traditionally regarded as a primarily technological concern; the fundamental questions to which security researchers address themselves are those of the mathematical guarantees that can be made for the performance of various communication and computational challenges. However, in our research, we focus on a different question. For us, the fundamental security question is one that end-users routinely encounter and resolve for themselves many times a day--the question of whether a system is secure enough for their immediate needs.In this paper, we will describe our explorations of this issue. In particular, we will draw on three major elements of our research to date. The first is empirical investigation into everyday security practices, looking at how people manage security as a practical, day-to-day concern, and exploring the context in which security decisions are made. This empirical work provides a foundation for our reconsideration of the problems of security to a large degree as an interactional problem. The second is our systems approach, based on visualization and event-based architectures. This technical approach provides a broad platform for investigating security and interaction, based on a set of general principles. The third is our initial experiences in a prototype deployment of these mechanisms in an application for peer-to-peer file sharing in face-to-face collaborative settings. We have been using this application as the basis of an initial evaluation of our technology in support of everyday security practices in collaborative workgroups.

[1]  Mark W. Newman,et al.  Listening in: practices surrounding iTunes music sharing , 2005, CHI.

[2]  Cynthia E. Irvine,et al.  Toward a taxonomy and costing method for security services , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).

[3]  R. Jagannathan,et al.  A prototype real-time intrusion-detection expert system , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[4]  Steven Pemberton,et al.  CHI '97 Extended Abstracts on Human Factors in Computing Systems , 1997, CHI 1997.

[5]  Cynthia E. Irvine,et al.  Quality of security service , 2001, NSPW '00.

[6]  C. Bullard Shaping technology/Building society , 1994 .

[7]  Nathaniel Good,et al.  Usability and privacy: a study of Kazaa P2P file-sharing , 2003, CHI '03.

[8]  David A. Wagner,et al.  A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.

[9]  David F. Redmiles,et al.  Creating an Infrastructure for Ubiquitous Awareness , 2001, INTERACT.

[10]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[11]  E. James Whitehead,et al.  HTTP Extensions for Distributed Authoring - WEBDAV , 1999, RFC.

[12]  Dan Thompson,et al.  Incremental assurance for multilevel applications , 1997, Proceedings 13th Annual Computer Security Applications Conference.

[13]  Massimo Bernaschi,et al.  Operating system enhancements to prevent the misuse of system calls , 2000, CCS.

[14]  D. Kahn The codebreakers : the story of secret writing , 1968 .

[15]  Marvin Theimer,et al.  The Doctor Is In: Helping End Users Understand the Health of Distributed Systems , 2000, DSOM.

[16]  Mary Ellen Zurko,et al.  User-centered security , 1996, NSPW '96.

[17]  B. Latour 10 ''Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts'' , 1992 .

[18]  Harold Thimbleby,et al.  Proceedings of HCI on People and Computers XII , 1997 .

[19]  Jonathan K. Millen,et al.  Three systems for cryptographic protocol analysis , 1994, Journal of Cryptology.

[20]  Tamara Munzner,et al.  Visualizing the global topology of the MBone , 1996, Proceedings IEEE Symposium on Information Visualization '96.

[21]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[22]  Mark S. Ackerman,et al.  Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.

[23]  Cynthia E. Irvine,et al.  Calculating costs for quality of security service , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).

[24]  Paul Dourish,et al.  Two experiences designing for effective security , 2005, SOUPS '05.

[25]  Saul Greenberg,et al.  Real time groupware as a distributed system: concurrency control and its effect on the interface , 1994, CSCW '94.

[26]  Serge Vaudenay,et al.  Proceedings of the 5th International Workshop on Fast Software Encryption , 1998 .

[27]  David S. Rosenblum,et al.  Design and evaluation of a wide-area event notification service , 2001, TOCS.

[28]  Mark S. Ackerman,et al.  Privacy critics: UI components to safeguard users' privacy , 1999, CHI Extended Abstracts.

[29]  Prasun Dewan,et al.  Flexible meta access-control for collaborative applications , 1998, CSCW '98.

[30]  M. Angela Sasse,et al.  Users are not the enemy , 1999, CACM.

[31]  D. Pinto Secrets and Lies: Digital Security in a Networked World , 2003 .

[32]  M. Angela Sasse,et al.  Are Passfaces More Usable Than Passwords? A Field Trial Investigation , 2000, BCS HCI.

[33]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[34]  David A. Wagner,et al.  This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .

[35]  Jerome H. Saltzer,et al.  End-to-end arguments in system design , 1984, TOCS.

[36]  Morrie Gasser,et al.  Security Kernel Design and Implementation: An Introduction , 1983, Computer.

[37]  David D. Clark,et al.  Rethinking the design of the Internet , 2001, ACM Trans. Internet Techn..

[38]  Paul Dourish,et al.  Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.

[39]  Prasun Dewan,et al.  Access control for collaborative environments , 1992, CSCW '92.

[40]  Daniel G. Bobrow,et al.  Design for Conversation: Lessons from Cognoter , 1991, Int. J. Man Mach. Stud..

[41]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[42]  P. Dourish Privacy , Security ... and Risk and Danger and Secrecy and Trust and Morality and Identity and Power : Understanding Collective Information Practices , 2005 .

[43]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[44]  D. Saunders The brave new world , 1999 .

[45]  Gilbert Cockton,et al.  People and Computers XIV — Usability or Else! , 2000, Springer London.

[46]  David F. Redmiles,et al.  The design of a configurable, extensible and dynamic notification service , 2003, DEBS '03.

[47]  Bruce Schneier,et al.  Secrets and Lies: Digital Security in a Networked World , 2000 .

[48]  M. Angela Sasse,et al.  Making Passwords Secure and Usable , 1997, BCS HCI.

[49]  Bettina Berendt,et al.  E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.

[50]  Raphael A. Finkel,et al.  Pulsar: an extensible tool for monitoring large Unix sites , 1997, Softw. Pract. Exp..

[51]  Adrian Perrig,et al.  This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .

[52]  Bruce Schneier,et al.  Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP) , 1998, CCS '98.

[53]  Johanna D. Moore,et al.  Proceedings of the Conference on Human Factors in Computing Systems , 1989 .

[54]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[55]  M. Angela Sasse,et al.  Pretty good persuasion: a first step towards effective password security in the real world , 2001, NSPW '01.

[56]  Bruce Schneier,et al.  Cryptanalytic Attacks on Pseudorandom Number Generators , 1998, FSE.

[57]  Paul Dourish,et al.  An approach to usable security based on event monitoring and visualization , 2002, NSPW '02.

[58]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[59]  Paul Dourish,et al.  Culture and Control in a Media Space , 1993, ECSCW.

[60]  Ronda R. Henning,et al.  Security service level agreements: quantifiable security for the enterprise? , 1999, NSPW '99.

[61]  Ross J. Anderson Why cryptosystems fail , 1994, CACM.