首页 > 最新文献

Symposium On Usable Privacy and Security最新文献

英文 中文
Android permissions: user attention, comprehension, and behavior 安卓权限:用户注意力、理解力和行为
Pub Date : 2012-07-11 DOI: 10.1145/2335356.2335360
A. Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, D. Wagner
Android's permission system is intended to inform users about the risks of installing applications. When a user installs an application, he or she has the opportunity to review the application's permission requests and cancel the installation if the permissions are excessive or objectionable. We examine whether the Android permission system is effective at warning users. In particular, we evaluate whether Android users pay attention to, understand, and act on permission information during installation. We performed two usability studies: an Internet survey of 308 Android users, and a laboratory study wherein we interviewed and observed 25 Android users. Study participants displayed low attention and comprehension rates: both the Internet survey and laboratory study found that 17% of participants paid attention to permissions during installation, and only 3% of Internet survey respondents could correctly answer all three permission comprehension questions. This indicates that current Android permission warnings do not help most users make correct security decisions. However, a notable minority of users demonstrated both awareness of permission warnings and reasonable rates of comprehension. We present recommendations for improving user attention and comprehension, as well as identify open challenges.
Android 的权限系统旨在告知用户安装应用程序的风险。当用户安装应用程序时,他或她有机会查看应用程序的权限请求,如果权限过多或令人反感,他或她可以取消安装。我们研究了安卓权限系统在警告用户方面是否有效。特别是,我们评估了安卓用户在安装过程中是否关注、理解权限信息并采取相应行动。我们进行了两项可用性研究:一项是针对 308 名安卓用户的互联网调查,另一项是对 25 名安卓用户进行访谈和观察的实验室研究。研究参与者的关注率和理解率都很低:互联网调查和实验室研究都发现,17% 的参与者在安装过程中关注了权限信息,只有 3% 的互联网调查受访者能正确回答所有三个权限理解问题。这表明,目前的安卓权限警告并不能帮助大多数用户做出正确的安全决定。不过,也有少数用户表现出了对权限警告的意识和合理的理解率。我们提出了提高用户关注度和理解力的建议,并指出了有待解决的难题。
{"title":"Android permissions: user attention, comprehension, and behavior","authors":"A. Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, D. Wagner","doi":"10.1145/2335356.2335360","DOIUrl":"https://doi.org/10.1145/2335356.2335360","url":null,"abstract":"Android's permission system is intended to inform users about the risks of installing applications. When a user installs an application, he or she has the opportunity to review the application's permission requests and cancel the installation if the permissions are excessive or objectionable. We examine whether the Android permission system is effective at warning users. In particular, we evaluate whether Android users pay attention to, understand, and act on permission information during installation. We performed two usability studies: an Internet survey of 308 Android users, and a laboratory study wherein we interviewed and observed 25 Android users. Study participants displayed low attention and comprehension rates: both the Internet survey and laboratory study found that 17% of participants paid attention to permissions during installation, and only 3% of Internet survey respondents could correctly answer all three permission comprehension questions. This indicates that current Android permission warnings do not help most users make correct security decisions. However, a notable minority of users demonstrated both awareness of permission warnings and reasonable rates of comprehension. We present recommendations for improving user attention and comprehension, as well as identify open challenges.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131383187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1123
Relating declarative semantics and usability in access control 与访问控制中的声明性语义和可用性相关
Pub Date : 2012-07-11 DOI: 10.1145/2335356.2335375
Vivek Krishnan, Mahesh V. Tripunitara, Kinson Chik, T. Bergstrom
Usability is widely recognized as a problem in the context of the administration of access control systems. We seek to relate the notion of declarative semantics, a recurring theme in research in access control, with usability. We adopt the concrete context of POSIX ACLs and the traditional interface for it that comprises two utilities getfacl and setfacl whose natural semantics is operational. We have designed and implemented an alternate interface that we call askfacl whose natural semantics is declarative. We discuss our design of askfacl. We then discuss a human-subject usability study that we have designed and conducted that compares the two interfaces. Our results measurably demonstrate the goodness of declarative semantics in access control.
可用性被广泛认为是访问控制系统管理中的一个问题。我们试图将声明性语义的概念(访问控制研究中反复出现的主题)与可用性联系起来。我们采用POSIX acl的具体上下文和它的传统接口,包括两个实用程序getfacl和setfacl,它们的自然语义是可操作的。我们已经设计并实现了一个替代接口,我们称之为askfacl,它的自然语义是声明式的。我们讨论了我们的askfacl设计。然后,我们讨论了我们设计并实施的一项以人为主题的可用性研究,该研究比较了这两种界面。我们的结果可测量地证明了声明性语义在访问控制中的优点。
{"title":"Relating declarative semantics and usability in access control","authors":"Vivek Krishnan, Mahesh V. Tripunitara, Kinson Chik, T. Bergstrom","doi":"10.1145/2335356.2335375","DOIUrl":"https://doi.org/10.1145/2335356.2335375","url":null,"abstract":"Usability is widely recognized as a problem in the context of the administration of access control systems. We seek to relate the notion of declarative semantics, a recurring theme in research in access control, with usability. We adopt the concrete context of POSIX ACLs and the traditional interface for it that comprises two utilities getfacl and setfacl whose natural semantics is operational. We have designed and implemented an alternate interface that we call askfacl whose natural semantics is declarative. We discuss our design of askfacl. We then discuss a human-subject usability study that we have designed and conducted that compares the two interfaces. Our results measurably demonstrate the goodness of declarative semantics in access control.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114749773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Are privacy concerns a turn-off?: engagement and privacy in social networks 隐私问题会让人厌烦吗?:社交网络中的参与度和隐私
Pub Date : 2012-07-11 DOI: 10.1145/2335356.2335370
Jessica Staddon, David A. Huffaker, Larkin Brown, Aaron Sedley
We describe survey results from a representative sample of 1,075 U. S. social network users who use Facebook as their primary network. Our results show a strong association between low engagement and privacy concern. Specifically, users who report concerns around sharing control, comprehension of sharing practices or general Facebook privacy concern, also report consistently less time spent as well as less (self-reported) posting, commenting and "Like"ing of content. The limited evidence of other significant differences between engaged users and others suggests that privacy-related concerns may be an important gate to engagement. Indeed, privacy concern and network size are the only malleable attributes that we find to have significant association with engagement. We manually categorize the privacy concerns finding that many are nonspecific and not associated with negative personal experiences. Finally, we identify some education and utility issues associated with low social network activity, suggesting avenues for increasing engagement amongst current users.
我们对1075名使用Facebook作为主要社交网络的美国社交网络用户的代表性样本进行了调查。我们的研究结果显示,低参与度与隐私担忧之间存在很强的关联。具体来说,那些担心分享控制、理解分享做法或一般Facebook隐私问题的用户也表示,他们花在Facebook上的时间和发帖、评论和点赞的时间都持续减少(自我报告)。关于粘性用户和其他用户之间其他显著差异的有限证据表明,与隐私相关的担忧可能是粘性的重要门户。事实上,隐私关注和网络规模是我们发现与用户粘性有显著关联的唯一可塑属性。我们手动对隐私问题进行分类,发现许多问题并不具体,也与负面的个人经历无关。最后,我们确定了一些与低社交网络活动相关的教育和实用问题,建议提高当前用户粘性的途径。
{"title":"Are privacy concerns a turn-off?: engagement and privacy in social networks","authors":"Jessica Staddon, David A. Huffaker, Larkin Brown, Aaron Sedley","doi":"10.1145/2335356.2335370","DOIUrl":"https://doi.org/10.1145/2335356.2335370","url":null,"abstract":"We describe survey results from a representative sample of 1,075 U. S. social network users who use Facebook as their primary network. Our results show a strong association between low engagement and privacy concern. Specifically, users who report concerns around sharing control, comprehension of sharing practices or general Facebook privacy concern, also report consistently less time spent as well as less (self-reported) posting, commenting and \"Like\"ing of content. The limited evidence of other significant differences between engaged users and others suggests that privacy-related concerns may be an important gate to engagement. Indeed, privacy concern and network size are the only malleable attributes that we find to have significant association with engagement. We manually categorize the privacy concerns finding that many are nonspecific and not associated with negative personal experiences. Finally, we identify some education and utility issues associated with low social network activity, suggesting avenues for increasing engagement amongst current users.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127266988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
The PViz comprehension tool for social network privacy settings 社交网络隐私设置的PViz理解工具
Pub Date : 2012-07-11 DOI: 10.1145/2335356.2335374
A. Mazzia, K. LeFevre, Eytan Adar
Users' mental models of privacy and visibility in social networks often involve subgroups within their local networks of friends. Many social networking sites have begun building interfaces to support grouping, like Facebook's lists and "Smart Lists," and Google+'s "Circles." However, existing policy comprehension tools, such as Facebook's Audience View, are not aligned with this mental model. In this paper, we introduce PViz, an interface and system that corresponds more directly with how users model groups and privacy policies applied to their networks. PViz allows the user to understand the visibility of her profile according to automatically-constructed, natural sub-groupings of friends, and at different levels of granularity. Because the user must be able to identify and distinguish automatically-constructed groups, we also address the important sub-problem of producing effective group labels. We conducted an extensive user study comparing PViz to current policy comprehension tools (Facebook's Audience View and Custom Settings page). Our study revealed that PViz was comparable to Audience View for simple tasks, and provided a significant improvement for complex, group-based tasks, despite requiring users to adapt to a new tool. Utilizing feedback from the user study, we further iterated on our design, constructing PViz 2.0, and conducted a follow-up study to evaluate our refinements.
在社交网络中,用户对隐私和可见性的心理模型通常涉及他们本地朋友网络中的子群体。许多社交网站已经开始构建支持分组的界面,比如Facebook的列表和“智能列表”,以及Google+的“圈子”。然而,现有的政策理解工具,如Facebook的受众视图,并不符合这种思维模式。在本文中,我们介绍了PViz,这是一个接口和系统,它更直接地对应于用户如何建模组和应用于其网络的隐私策略。PViz允许用户根据自动构建的、自然的朋友子分组,在不同的粒度级别上了解她的个人资料的可见性。由于用户必须能够识别和区分自动构建的组,因此我们还解决了生成有效组标签的重要子问题。我们进行了广泛的用户研究,将PViz与当前的政策理解工具(Facebook的受众视图和自定义设置页面)进行了比较。我们的研究表明,PViz在处理简单任务时与Audience View相当,并且在处理复杂的、基于组的任务时提供了显著的改进,尽管需要用户适应新工具。利用来自用户研究的反馈,我们进一步迭代了我们的设计,构建了PViz 2.0,并进行了后续研究来评估我们的改进。
{"title":"The PViz comprehension tool for social network privacy settings","authors":"A. Mazzia, K. LeFevre, Eytan Adar","doi":"10.1145/2335356.2335374","DOIUrl":"https://doi.org/10.1145/2335356.2335374","url":null,"abstract":"Users' mental models of privacy and visibility in social networks often involve subgroups within their local networks of friends. Many social networking sites have begun building interfaces to support grouping, like Facebook's lists and \"Smart Lists,\" and Google+'s \"Circles.\" However, existing policy comprehension tools, such as Facebook's Audience View, are not aligned with this mental model. In this paper, we introduce PViz, an interface and system that corresponds more directly with how users model groups and privacy policies applied to their networks. PViz allows the user to understand the visibility of her profile according to automatically-constructed, natural sub-groupings of friends, and at different levels of granularity. Because the user must be able to identify and distinguish automatically-constructed groups, we also address the important sub-problem of producing effective group labels. We conducted an extensive user study comparing PViz to current policy comprehension tools (Facebook's Audience View and Custom Settings page). Our study revealed that PViz was comparable to Audience View for simple tasks, and provided a significant improvement for complex, group-based tasks, despite requiring users to adapt to a new tool. Utilizing feedback from the user study, we further iterated on our design, constructing PViz 2.0, and conducted a follow-up study to evaluate our refinements.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128600602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 144
It's no secret: measuring the security and reliability of authentication via 'secret' questions 这不是什么秘密:通过“秘密”问题来衡量身份验证的安全性和可靠性
Pub Date : 2009-07-15 DOI: 10.1145/1572532.1572580
Stuart Schechter, A. J. B. Brush, Serge Egelman
All four of the most popular webmail providers ‐ AOL, Google, Microsoft, and Yahoo! ‐ rely on personal questions as the secondary authentication secrets used to reset account passwords. The security of these questions has received limited formal scrutiny, almost all of which predates webmail. We ran a user study to measure the reliability and security of the questions used by all four webmail providers. We asked participants to answer these questions and then asked their acquaintances to guess their answers. Acquaintances with whom participants reported being unwilling to share their webmail passwords were able to guess 17% of their answers. Participants forgot 20% of their own answers within six months. What’s more, 13% of answers could be guessed within five attempts by guessing the most popular answers of other participants, though this weakness is partially attributable to the geographic homogeneity of our participant pool.
所有四个最流行的网络邮件提供商——AOL、Google、Microsoft和Yahoo!‐依赖于个人问题作为二级认证秘密用于重置帐户密码。这些问题的安全性受到了有限的正式审查,几乎所有这些审查都是在网络邮件之前进行的。我们进行了一项用户研究,以衡量所有四家网络邮件提供商使用的问题的可靠性和安全性。我们让参与者回答这些问题,然后让他们的熟人猜测他们的答案。参与者报告说,不愿与之分享网络邮箱密码的熟人能猜出17%的答案。参与者在六个月内忘记了20%的答案。更重要的是,13%的答案可以通过猜测其他参与者最受欢迎的答案在五次尝试中猜出来,尽管这种弱点部分归因于我们的参与者群体的地理同质性。
{"title":"It's no secret: measuring the security and reliability of authentication via 'secret' questions","authors":"Stuart Schechter, A. J. B. Brush, Serge Egelman","doi":"10.1145/1572532.1572580","DOIUrl":"https://doi.org/10.1145/1572532.1572580","url":null,"abstract":"All four of the most popular webmail providers ‐ AOL, Google, Microsoft, and Yahoo! ‐ rely on personal questions as the secondary authentication secrets used to reset account passwords. The security of these questions has received limited formal scrutiny, almost all of which predates webmail. We ran a user study to measure the reliability and security of the questions used by all four webmail providers. We asked participants to answer these questions and then asked their acquaintances to guess their answers. Acquaintances with whom participants reported being unwilling to share their webmail passwords were able to guess 17% of their answers. Participants forgot 20% of their own answers within six months. What’s more, 13% of answers could be guessed within five attempts by guessing the most popular answers of other participants, though this weakness is partially attributable to the geographic homogeneity of our participant pool.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116559452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Evaluating the usability of usage controls in electronic collaboration 评估电子协作中使用控制的可用性
Pub Date : 2008-07-23 DOI: 10.1145/1408664.1408676
J. Brustoloni, Ricardo Villamarín-Salomón, Peter L. Djalaliev, David Kyle
Currently, collaborations often require non-disclosure agreements (NDAs). NDAs can be time-consuming and expensive to negotiate and enforce. Usage controls could be an atractive alternative or adjunct to NDAs. Usage controls enable the distributor of a file to limit how recipients of that file may use it. However, existing usage controls (e.g., PDF's) often are software-based and easy to break. They may not interoperate, and their impact on collaborative workflows is typically unknown. We designed and implemented operating system and Web server and browser modifications that allow hardware-based usage controls to be easily added to existing software-based ones. This paper describes and evaluates our system's user interfaces. In a user study, untrained users role-played design engineers in two similar collaborative scenarios with or without usage controls. Users found the interfaces easy to use, and usage controls had insignificant impact on the completion times and accuracy of the assigned tasks. These results suggest that our usage control approach can add security to collaborative workflows with minimal training and performance penalties.
目前,合作通常需要保密协议(nda)。nda的谈判和执行既耗时又昂贵。使用控制可能是nda的一个有吸引力的替代方案或辅助方案。使用控制使文件的分发者能够限制该文件的接收者如何使用该文件。然而,现有的使用控制(例如PDF)通常是基于软件的,很容易被破坏。它们可能不能互操作,并且它们对协作工作流的影响通常是未知的。我们设计并实现了对操作系统、Web服务器和浏览器的修改,这些修改允许将基于硬件的使用控制轻松地添加到现有的基于软件的使用控制中。本文对系统的用户界面进行了描述和评价。在一项用户研究中,未经训练的用户在两个类似的协作场景中扮演设计工程师的角色,有或没有使用控制。用户发现界面易于使用,使用控制对分配任务的完成时间和准确性影响不大。这些结果表明,我们的使用控制方法可以在最少的训练和性能损失的情况下为协作工作流增加安全性。
{"title":"Evaluating the usability of usage controls in electronic collaboration","authors":"J. Brustoloni, Ricardo Villamarín-Salomón, Peter L. Djalaliev, David Kyle","doi":"10.1145/1408664.1408676","DOIUrl":"https://doi.org/10.1145/1408664.1408676","url":null,"abstract":"Currently, collaborations often require non-disclosure agreements (NDAs). NDAs can be time-consuming and expensive to negotiate and enforce. Usage controls could be an atractive alternative or adjunct to NDAs. Usage controls enable the distributor of a file to limit how recipients of that file may use it. However, existing usage controls (e.g., PDF's) often are software-based and easy to break. They may not interoperate, and their impact on collaborative workflows is typically unknown. We designed and implemented operating system and Web server and browser modifications that allow hardware-based usage controls to be easily added to existing software-based ones. This paper describes and evaluates our system's user interfaces. In a user study, untrained users role-played design engineers in two similar collaborative scenarios with or without usage controls. Users found the interfaces easy to use, and usage controls had insignificant impact on the completion times and accuracy of the assigned tasks. These results suggest that our usage control approach can add security to collaborative workflows with minimal training and performance penalties.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"846 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127258744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Evaluating assistance of natural language policy authoring 评估自然语言政策制定的协助
Pub Date : 2008-07-23 DOI: 10.1145/1408664.1408674
Kami Vaniea, Clare-Marie Karat, Joshua B. Gross, J. Karat, C. Brodie
The goal of the research study reported here was to investigate policy authors' ability to take descriptions of changes to policy situations and author high-quality, complete policy rules that would parse with high accuracy. As a part of this research, we investigated ways in which we could assist policy authors in writing policies. This paper presents the results of a user study on the effectiveness of providing syntax highlighting in a natural language policy authoring interface. While subjects liked the new interface, they showed no improvement in accuracy when writing rules. We discuss our results in terms of a three phase authoring process that users move through when authoring or modifying policies. We describe this process, discuss why and how our interface failed to support it and make recommendations to designers on how to better support this process.
本文报告的研究的目标是调查策略作者对策略情况的变化进行描述的能力,以及编写高质量、完整的策略规则的能力,这些规则可以进行高精度的解析。作为这项研究的一部分,我们调查了我们可以帮助政策制定者撰写政策的方法。本文介绍了在自然语言策略编写界面中提供语法高亮显示的有效性的用户研究结果。虽然实验对象喜欢新的界面,但他们在书写规则时的准确性没有提高。我们根据用户在创作或修改策略时所经历的三个阶段创作过程来讨论我们的结果。我们描述了这个过程,讨论了我们的界面为什么和如何不能支持它,并就如何更好地支持这个过程向设计师提出建议。
{"title":"Evaluating assistance of natural language policy authoring","authors":"Kami Vaniea, Clare-Marie Karat, Joshua B. Gross, J. Karat, C. Brodie","doi":"10.1145/1408664.1408674","DOIUrl":"https://doi.org/10.1145/1408664.1408674","url":null,"abstract":"The goal of the research study reported here was to investigate policy authors' ability to take descriptions of changes to policy situations and author high-quality, complete policy rules that would parse with high accuracy. As a part of this research, we investigated ways in which we could assist policy authors in writing policies. This paper presents the results of a user study on the effectiveness of providing syntax highlighting in a natural language policy authoring interface. While subjects liked the new interface, they showed no improvement in accuracy when writing rules. We discuss our results in terms of a three phase authoring process that users move through when authoring or modifying policies. We describe this process, discuss why and how our interface failed to support it and make recommendations to designers on how to better support this process.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129743628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Expressions of expertness: the virtuous circle of natural language for access control policy specification 熟练度的表达:访问控制策略规范自然语言的良性循环
Pub Date : 2008-07-23 DOI: 10.1145/1408664.1408675
P. Inglesant, M. Sasse, D. Chadwick, L. Shi
The implementation of usable security is particularly challenging in the growing field of Grid computing, where control is decentralised, systems are heterogeneous, and authorization applies across administrative domains. PERMIS, based on the Role-Based Access Control (RBAC) model, provides a unified infrastructure to address these challenges. Previous research has found that resource owners who do not understand the PERMIS RBAC model have difficulty expressing access control policies. We have addressed this issue by investigating the use of a controlled natural language parser for expressing these policies. In this paper, we describe our experiences in the design, implementation, and evaluation of this parser for the PERMIS Editor. We began by understanding Grid access control needs as expressed by resource owners, through interviews and focus groups with 45 Grid practitioners. We found that the many areas of Grid computing use present varied security requirements; this suggests a minimal, open design. We designed and implemented a controlled natural language system to support these needs, which we evaluated with a cross-section of 17 target users. We found that participants were not daunted by the text editor, and understood the syntax easily. However, some strict requirements of the controlled language were problematic. Using controlled natural language helps overcome some conceptual mis-matches between PERMIS RBAC and older paradigms; however, there are still subtleties which are not always understood. In conclusion, the parser is not sufficient on its own, and should be seen in the interplay with other parts of the PERMIS Editor, so that, iteratively, users are helped to understand the underlying PERMIS model and to express their security policies more accurately and more completely.
在网格计算这个不断发展的领域中,实现可用的安全性尤其具有挑战性,因为在网格计算中,控制是分散的,系统是异构的,并且授权可以跨管理域应用。PERMIS基于基于角色的访问控制(RBAC)模型,提供了一个统一的基础设施来应对这些挑战。先前的研究发现,不了解PERMIS RBAC模型的资源所有者在表达访问控制策略方面存在困难。我们通过研究使用受控的自然语言解析器来表达这些策略,解决了这个问题。在本文中,我们描述了我们在PERMIS Editor的解析器的设计、实现和评估方面的经验。通过对45位网格实践者的访谈和焦点小组,我们首先了解了资源所有者表达的网格访问控制需求。我们发现网格计算使用的许多领域呈现出不同的安全需求;这意味着一个最小的,开放的设计。我们设计并实现了一个受控的自然语言系统来支持这些需求,我们对17个目标用户的横截面进行了评估。我们发现参与者并没有被文本编辑器吓倒,而且很容易理解语法。但是,对受控语言的一些严格要求是有问题的。使用受控的自然语言有助于克服PERMIS RBAC与旧范式之间的一些概念不匹配;然而,仍有一些微妙之处并不总是被理解。总之,解析器本身是不够的,应该在与PERMIS Editor的其他部分的相互作用中看到,这样,迭代地,帮助用户理解底层PERMIS模型,并更准确、更完整地表达他们的安全策略。
{"title":"Expressions of expertness: the virtuous circle of natural language for access control policy specification","authors":"P. Inglesant, M. Sasse, D. Chadwick, L. Shi","doi":"10.1145/1408664.1408675","DOIUrl":"https://doi.org/10.1145/1408664.1408675","url":null,"abstract":"The implementation of usable security is particularly challenging in the growing field of Grid computing, where control is decentralised, systems are heterogeneous, and authorization applies across administrative domains. PERMIS, based on the Role-Based Access Control (RBAC) model, provides a unified infrastructure to address these challenges. Previous research has found that resource owners who do not understand the PERMIS RBAC model have difficulty expressing access control policies. We have addressed this issue by investigating the use of a controlled natural language parser for expressing these policies. In this paper, we describe our experiences in the design, implementation, and evaluation of this parser for the PERMIS Editor. We began by understanding Grid access control needs as expressed by resource owners, through interviews and focus groups with 45 Grid practitioners. We found that the many areas of Grid computing use present varied security requirements; this suggests a minimal, open design. We designed and implemented a controlled natural language system to support these needs, which we evaluated with a cross-section of 17 target users. We found that participants were not daunted by the text editor, and understood the syntax easily. However, some strict requirements of the controlled language were problematic. Using controlled natural language helps overcome some conceptual mis-matches between PERMIS RBAC and older paradigms; however, there are still subtleties which are not always understood. In conclusion, the parser is not sufficient on its own, and should be seen in the interplay with other parts of the PERMIS Editor, so that, iteratively, users are helped to understand the underlying PERMIS model and to express their security policies more accurately and more completely.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131289532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Improving text passwords through persuasion 通过说服改进文本密码
Pub Date : 2008-07-23 DOI: 10.1145/1408664.1408666
Alain Forget, S. Chiasson, P. V. Oorschot, R. Biddle
Password restriction policies and advice on creating secure passwords have limited effects on password strength. Influencing users to create more secure passwords remains an open problem. We have developed Persuasive Text Passwords (PTP), a text password creation system which leverages Persuasive Technology principles to influence users in creating more secure passwords without sacrificing usability. After users choose a password during creation, PTP improves its security by placing randomly-chosen characters at random positions into the password. Users may shuffle to be presented with randomly-chosen and positioned characters until they find a combination they feel is memorable. In this paper, we present an 83-participant user study testing four PTP variations. Our results show that the PTP variations significantly improved the security of users' passwords. We also found that those participants who had a high number of random characters placed into their passwords would deliberately choose weaker pre-improvement passwords to compensate for the memory load. As a consequence of this compensatory behaviour, there was a limit to the gain in password security achieved by PTP.
密码限制策略和创建安全密码的建议对密码强度的影响有限。影响用户创建更安全的密码仍然是一个悬而未决的问题。我们开发了有说服力的文本密码(PTP),这是一个文本密码创建系统,它利用有说服力的技术原则来影响用户创建更安全的密码,而不会牺牲可用性。用户在创建过程中选择密码后,PTP通过在密码中随机位置放置随机选择的字符来提高安全性。用户可能会随机选择和定位字符,直到找到他们觉得难忘的组合。在本文中,我们提出了一个83参与者的用户研究测试四个PTP变化。我们的研究结果表明,PTP的变化显著提高了用户密码的安全性。我们还发现,那些在密码中放入大量随机字符的参与者会故意选择较弱的改进前密码,以补偿内存负荷。作为这种补偿行为的结果,PTP在密码安全性方面的收益是有限的。
{"title":"Improving text passwords through persuasion","authors":"Alain Forget, S. Chiasson, P. V. Oorschot, R. Biddle","doi":"10.1145/1408664.1408666","DOIUrl":"https://doi.org/10.1145/1408664.1408666","url":null,"abstract":"Password restriction policies and advice on creating secure passwords have limited effects on password strength. Influencing users to create more secure passwords remains an open problem. We have developed Persuasive Text Passwords (PTP), a text password creation system which leverages Persuasive Technology principles to influence users in creating more secure passwords without sacrificing usability. After users choose a password during creation, PTP improves its security by placing randomly-chosen characters at random positions into the password. Users may shuffle to be presented with randomly-chosen and positioned characters until they find a combination they feel is memorable. In this paper, we present an 83-participant user study testing four PTP variations. Our results show that the PTP variations significantly improved the security of users' passwords. We also found that those participants who had a high number of random characters placed into their passwords would deliberately choose weaker pre-improvement passwords to compensate for the memory load. As a consequence of this compensatory behaviour, there was a limit to the gain in password security achieved by PTP.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131692927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 190
Universal device pairing using an auxiliary device 通用设备配对使用辅助设备
Pub Date : 2008-07-23 DOI: 10.1145/1408664.1408672
Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris
The operation of achieving authenticated key agreement between two human-operated devices over a short-range wireless communication channel (such as Bluetooth or WiFi) is referred to as "Pairing". The devices in such a scenario are ad hoc in nature, i.e., they can neither be assumed to have a prior context (such as pre-shared secrets) with each other nor do they share a common trusted on- or off-line authority. However, the devices can generally be connected using auxiliary physical channel(s) (such as audio, visual, etc.) that can be authenticated by the device user(s) and thus form a basis for pairing. One of the main challenges of secure device pairing is the lack of good quality output interfaces as well as corresponding receivers on devices. In [13], we presented a pairing scheme which is universally applicable to any pair of devices (such as a WiFi AP and a laptop, a Bluetooth keyboard and a desktop, etc.). The scheme is based upon the device user(s) comparing short and simple synchronized audiovisual patterns, such as "beeping" and "blinking". In this paper, we automate the (manual) scheme of [13] by making use of an auxiliary, commonly available device such as a personal camera phone. Based on a preliminary user study we conducted, we show that the automated scheme is generally faster and more user-friendly relative to the manual scheme. More importantly, the proposed scheme turns out to be quite accurate in the detection of any possible attacks.
通过短距离无线通信信道(如蓝牙或WiFi)在两个人工操作设备之间实现认证密钥协议的操作称为“配对”。这种场景中的设备本质上是特别的,也就是说,既不能假定它们彼此具有先前的上下文(例如预共享的秘密),也不能假定它们共享共同的可信在线或离线权限。然而,设备通常可以使用辅助物理通道(如音频、视频等)连接,这些通道可以由设备用户进行身份验证,从而形成配对的基础。安全设备配对的主要挑战之一是缺乏高质量的输出接口以及设备上相应的接收器。在b[13]中,我们提出了一种普遍适用于任何设备对(如WiFi AP和笔记本电脑,蓝牙键盘和台式机等)的配对方案。该方案是基于设备用户比较短的和简单的同步视听模式,如“哔哔声”和“闪烁”。在本文中,我们通过使用辅助的、常用的设备,如个人拍照手机,来实现[13](手动)方案的自动化。根据我们进行的初步用户研究,我们表明,相对于手动方案,自动化方案通常更快,更用户友好。更重要的是,所提出的方案在检测任何可能的攻击方面都是非常准确的。
{"title":"Universal device pairing using an auxiliary device","authors":"Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris","doi":"10.1145/1408664.1408672","DOIUrl":"https://doi.org/10.1145/1408664.1408672","url":null,"abstract":"The operation of achieving authenticated key agreement between two human-operated devices over a short-range wireless communication channel (such as Bluetooth or WiFi) is referred to as \"Pairing\". The devices in such a scenario are ad hoc in nature, i.e., they can neither be assumed to have a prior context (such as pre-shared secrets) with each other nor do they share a common trusted on- or off-line authority. However, the devices can generally be connected using auxiliary physical channel(s) (such as audio, visual, etc.) that can be authenticated by the device user(s) and thus form a basis for pairing.\u0000 One of the main challenges of secure device pairing is the lack of good quality output interfaces as well as corresponding receivers on devices. In [13], we presented a pairing scheme which is universally applicable to any pair of devices (such as a WiFi AP and a laptop, a Bluetooth keyboard and a desktop, etc.). The scheme is based upon the device user(s) comparing short and simple synchronized audiovisual patterns, such as \"beeping\" and \"blinking\". In this paper, we automate the (manual) scheme of [13] by making use of an auxiliary, commonly available device such as a personal camera phone. Based on a preliminary user study we conducted, we show that the automated scheme is generally faster and more user-friendly relative to the manual scheme. More importantly, the proposed scheme turns out to be quite accurate in the detection of any possible attacks.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116376011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
期刊
Symposium On Usable Privacy and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1