A user study of policy creation in a flexible access-control system

Significant effort has been invested in developing expressive and flexible access-control languages and systems. However, little has been done to evaluate these systems in practical situations with real users, and few attempts have been made to discover and analyze the access-control policies that users actually want to implement. We report on a user study in which we derive the ideal access policies desired by a group of users for physical security in an office environment. We compare these ideal policies to the policies the users actually implemented with keys and with a smartphone-based distributed access-control system. We develop a methodology that allows us to show quantitatively that the smartphone system allowed our users to implement their ideal policies more accurately and securely than they could with keys, and we describe where each system fell short.

[1]  Lujo Bauer,et al.  Lessons learned from the deployment of a smartphone-based access-control system , 2007, SOUPS '07.

[2]  Xiang Cao,et al.  Intentional access management: making access control usable for end-users , 2006, SOUPS '06.

[3]  Robert W. Reeder,et al.  Improving user-interface dependability through mitigation of human error , 2005, Int. J. Hum. Comput. Stud..

[4]  David F. Ferraiolo,et al.  An Examination of Federal and Commercial Access Control Policy Needs , 1993 .

[5]  Ninghui Li,et al.  Understanding SPKI/SDSI using first-order logic , 2005, International Journal of Information Security.

[6]  Andrew W. Appel,et al.  Proof-carrying authentication , 1999, CCS '99.

[7]  Diana K. Smetters,et al.  User experiences with sharing and access control , 2006, CHI EA '06.

[8]  Lujo Bauer,et al.  Device-Enabled Authorization in the Grey System ¶ , 2006 .

[9]  Roy H. Campbell,et al.  KNOW Why your access was denied: regulating feedback for usable security , 2004, CCS '04.

[10]  Lujo Bauer,et al.  Efficient Proving for Practical Distributed Access-Control Systems , 2007, ESORICS.

[11]  Lionel M. Ni,et al.  The master key: a private authentication approach for pervasive computing environments , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).

[12]  James A. Landay,et al.  Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.

[13]  Martín Abadi,et al.  On SDSI's linked local name spaces , 1997, Proceedings 10th Computer Security Foundations Workshop.

[14]  Ninghui Li,et al.  Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[15]  Philippe Bonnet,et al.  Personal servers as digital keys , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.