首页 > 最新文献

Symposium On Usable Privacy and Security最新文献

英文 中文
Graphical passwords & qualitative spatial relations 图形密码和定性空间关系
Pub Date : 2007-07-18 DOI: 10.1145/1280680.1280708
D. Lin, Paul Dunphy, P. Olivier, Jeff Yan
A potential drawback of graphical password schemes is that they are more vulnerable to shoulder surfing than conventional alphanumeric text passwords. We present a variation of the Draw-a-Secret scheme originally proposed by Jermyn et al [1] that is more resistant to shoulder surfing through the use of a qualitative mapping between user strokes and the password, and the use of dynamic grids to both obfuscate attributes of the user secret and encourage them to use different surface realizations of the secret. The use of qualitative spatial relations relaxes the tight constraints on the reconstruction of a secret; allowing a range of deviations from the original. We describe QDAS (Qualitative Draw-A-Secret), an initial implementation of this graphical password scheme, and the results of an empirical study in which we examined the memorability of secrets, and their susceptibility to shoulder-surfing attacks, for both Draw-A-Secret and QDAS.
图形密码方案的一个潜在缺点是,与传统的字母数字文本密码相比,它们更容易受到肩部冲浪的攻击。我们提出了最初由Jermyn等人[1]提出的Draw-a-Secret方案的一种变体,该方案通过使用用户笔画和密码之间的定性映射,以及使用动态网格来混淆用户秘密的属性,并鼓励他们使用不同的秘密表面实现,从而更能抵抗肩部冲浪。定性空间关系的使用放松了对秘密重建的严格限制;允许有一定范围的偏离原始的。我们描述了QDAS (Qualitative Draw-A-Secret),这是该图形密码方案的初始实现,以及一项实证研究的结果,在该研究中,我们检查了Draw-A-Secret和QDAS的秘密的可记忆性及其对肩部冲浪攻击的易感性。
{"title":"Graphical passwords & qualitative spatial relations","authors":"D. Lin, Paul Dunphy, P. Olivier, Jeff Yan","doi":"10.1145/1280680.1280708","DOIUrl":"https://doi.org/10.1145/1280680.1280708","url":null,"abstract":"A potential drawback of graphical password schemes is that they are more vulnerable to shoulder surfing than conventional alphanumeric text passwords. We present a variation of the Draw-a-Secret scheme originally proposed by Jermyn et al [1] that is more resistant to shoulder surfing through the use of a qualitative mapping between user strokes and the password, and the use of dynamic grids to both obfuscate attributes of the user secret and encourage them to use different surface realizations of the secret. The use of qualitative spatial relations relaxes the tight constraints on the reconstruction of a secret; allowing a range of deviations from the original. We describe QDAS (Qualitative Draw-A-Secret), an initial implementation of this graphical password scheme, and the results of an empirical study in which we examined the memorability of secrets, and their susceptibility to shoulder-surfing attacks, for both Draw-A-Secret and QDAS.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130903451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
Reducing shoulder-surfing by using gaze-based password entry 通过使用基于凝视的密码输入来减少肩部冲浪
Pub Date : 2007-07-18 DOI: 10.1145/1280680.1280683
Manu Kumar, Tal Garfinkel, D. Boneh, T. Winograd
Shoulder-surfing -- using direct observation techniques, such as looking over someone's shoulder, to get passwords, PINs and other sensitive personal information -- is a problem that has been difficult to overcome. When a user enters information using a keyboard, mouse, touch screen or any traditional input device, a malicious observer may be able to acquire the user's password credentials. We present EyePassword, a system that mitigates the issues of shoulder surfing via a novel approach to user input. With EyePassword, a user enters sensitive input (password, PIN, etc.) by selecting from an on-screen keyboard using only the orientation of their pupils (i.e. the position of their gaze on screen), making eavesdropping by a malicious observer largely impractical. We present a number of design choices and discuss their effect on usability and security. We conducted user studies to evaluate the speed, accuracy and user acceptance of our approach. Our results demonstrate that gaze-based password entry requires marginal additional time over using a keyboard, error rates are similar to those of using a keyboard and subjects preferred the gaze-based password entry approach over traditional methods.
“偷窥”是指利用直接观察技术,比如越过某人的肩膀,获取密码、个人识别码和其他敏感的个人信息,这是一个很难克服的问题。当用户使用键盘、鼠标、触摸屏或任何传统输入设备输入信息时,恶意的观察者可能能够获取用户的密码凭据。我们提出EyePassword,这是一个通过新颖的用户输入方法减轻肩部冲浪问题的系统。有了EyePassword,用户只需通过瞳孔的方向(即他们凝视屏幕的位置)从屏幕上的键盘上选择,就可以输入敏感的输入(密码,PIN等),这使得恶意观察者的窃听在很大程度上是不切实际的。我们提出了一些设计选择,并讨论了它们对可用性和安全性的影响。我们进行了用户研究,以评估我们的方法的速度、准确性和用户接受程度。我们的研究结果表明,基于注视的密码输入比使用键盘需要额外的时间,错误率与使用键盘相似,并且受试者更喜欢基于注视的密码输入方法而不是传统方法。
{"title":"Reducing shoulder-surfing by using gaze-based password entry","authors":"Manu Kumar, Tal Garfinkel, D. Boneh, T. Winograd","doi":"10.1145/1280680.1280683","DOIUrl":"https://doi.org/10.1145/1280680.1280683","url":null,"abstract":"Shoulder-surfing -- using direct observation techniques, such as looking over someone's shoulder, to get passwords, PINs and other sensitive personal information -- is a problem that has been difficult to overcome. When a user enters information using a keyboard, mouse, touch screen or any traditional input device, a malicious observer may be able to acquire the user's password credentials. We present EyePassword, a system that mitigates the issues of shoulder surfing via a novel approach to user input.\u0000 With EyePassword, a user enters sensitive input (password, PIN, etc.) by selecting from an on-screen keyboard using only the orientation of their pupils (i.e. the position of their gaze on screen), making eavesdropping by a malicious observer largely impractical. We present a number of design choices and discuss their effect on usability and security. We conducted user studies to evaluate the speed, accuracy and user acceptance of our approach. Our results demonstrate that gaze-based password entry requires marginal additional time over using a keyboard, error rates are similar to those of using a keyboard and subjects preferred the gaze-based password entry approach over traditional methods.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131307294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 358
Usability of anonymous web browsing: an examination of Tor interfaces and deployability 匿名网页浏览的可用性:对Tor接口和可部署性的检查
Pub Date : 2007-07-18 DOI: 10.1145/1280680.1280687
Jeremy Clark, P. V. Oorschot, C. Adams
Tor is a popular privacy tool designed to help achieve online anonymity by anonymising web traffic. Employing cognitive walkthrough as the primary method, this paper evaluates four competing methods of deploying Tor clients, and a number of software tools designed to be used in conjunction with Tor: Vidalia, Privoxy, Torbutton, and FoxyProxy. It also considers the standalone anonymous browser TorPark. Our results show that none of the deployment options are fully satisfactory from a usability perspective, but we offer suggestions on how to incorporate the best aspects of each tool. As a framework for our usability evaluation, we also provide a set of guidelines for Tor usability compiled and adapted from existing work on usable security and human-computer interaction.
Tor是一种流行的隐私工具,旨在通过匿名网络流量来帮助实现在线匿名。本文采用认知演练作为主要方法,评估了部署Tor客户端的四种相互竞争的方法,以及一些设计用于与Tor结合使用的软件工具:Vidalia, Privoxy, Torbutton和FoxyProxy。它还考虑了独立的匿名浏览器TorPark。我们的结果表明,从可用性的角度来看,没有一个部署选项是完全令人满意的,但是我们提供了关于如何结合每个工具的最佳方面的建议。作为可用性评估的框架,我们还提供了一套Tor可用性指南,这些指南是根据可用安全性和人机交互方面的现有工作编译和改编的。
{"title":"Usability of anonymous web browsing: an examination of Tor interfaces and deployability","authors":"Jeremy Clark, P. V. Oorschot, C. Adams","doi":"10.1145/1280680.1280687","DOIUrl":"https://doi.org/10.1145/1280680.1280687","url":null,"abstract":"Tor is a popular privacy tool designed to help achieve online anonymity by anonymising web traffic. Employing cognitive walkthrough as the primary method, this paper evaluates four competing methods of deploying Tor clients, and a number of software tools designed to be used in conjunction with Tor: Vidalia, Privoxy, Torbutton, and FoxyProxy. It also considers the standalone anonymous browser TorPark. Our results show that none of the deployment options are fully satisfactory from a usability perspective, but we offer suggestions on how to incorporate the best aspects of each tool. As a framework for our usability evaluation, we also provide a set of guidelines for Tor usability compiled and adapted from existing work on usable security and human-computer interaction.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131887182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 85
Examining privacy and disclosure in a social networking community 研究社交网络社区中的隐私和信息披露
Pub Date : 2007-07-18 DOI: 10.1145/1280680.1280706
K. Strater, H. Lipford
The polularity of social networking websites such as Facebook and the subsequent levels and depth of online disclosures have raised several concerns for user privacy. Previous research into these sites has indicated the importance of disclosures between users as well as an under-utilization of extensive privacy options. This study qualitatively examines college students' disclosure and privacy behaviors and attitudes on Facebook.com. Results support current research into social networking and privacy and provide user-generated explanations for observed disclosure and privacy trends. Implications for future research into privacy software are discussed.
Facebook等社交网站的普及,以及随后在线信息披露的程度和深度,引发了对用户隐私的若干担忧。先前对这些网站的研究表明,用户之间信息披露的重要性,以及广泛的隐私选项的利用不足。本研究定性考察了大学生在Facebook.com上的信息披露和隐私行为和态度。结果支持当前对社交网络和隐私的研究,并为观察到的披露和隐私趋势提供用户生成的解释。讨论了对隐私软件未来研究的启示。
{"title":"Examining privacy and disclosure in a social networking community","authors":"K. Strater, H. Lipford","doi":"10.1145/1280680.1280706","DOIUrl":"https://doi.org/10.1145/1280680.1280706","url":null,"abstract":"The polularity of social networking websites such as Facebook and the subsequent levels and depth of online disclosures have raised several concerns for user privacy. Previous research into these sites has indicated the importance of disclosures between users as well as an under-utilization of extensive privacy options. This study qualitatively examines college students' disclosure and privacy behaviors and attitudes on Facebook.com. Results support current research into social networking and privacy and provide user-generated explanations for observed disclosure and privacy trends. Implications for future research into privacy software are discussed.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132882668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 112
Establishing darknet connections: an evaluation of usability and security 建立暗网连接:可用性和安全性的评估
Pub Date : 2007-07-18 DOI: 10.1145/1280680.1280700
J. Bethencourt, W. Y. Low, Isaac Simmons, Matthew M. Williamson
In many applications, hosts in a peer to peer network may wish to maintain their anonymity or the privacy of their queries. In some applications, an even stronger guarantee is desirable: hosts would like to prevent others from determining whether they participate in the network at all. Darknets, or friend-to-friend networks, are one approach to preventing the discovery of hosts within a peer to peer network [1]. In such a network, hosts only form Internet connections with and directly communicate with a small set of hosts whose operators are known and trusted a priori. That is, each user only connects to her friends, trusting that her friends will not reveal her identity or existence in the network.
在许多应用程序中,点对点网络中的主机可能希望保持其匿名性或查询的私密性。在某些应用程序中,甚至需要更强的保证:主机希望阻止其他主机决定它们是否参与网络。暗网,或朋友对朋友网络,是防止在点对点网络中发现主机的一种方法[1]。在这种网络中,主机只与一小部分主机形成Internet连接并直接通信,这些主机的运营商是已知的,并且是先验地信任的。也就是说,每个用户只与她的朋友联系,相信她的朋友不会泄露她在网络中的身份或存在。
{"title":"Establishing darknet connections: an evaluation of usability and security","authors":"J. Bethencourt, W. Y. Low, Isaac Simmons, Matthew M. Williamson","doi":"10.1145/1280680.1280700","DOIUrl":"https://doi.org/10.1145/1280680.1280700","url":null,"abstract":"In many applications, hosts in a peer to peer network may wish to maintain their anonymity or the privacy of their queries. In some applications, an even stronger guarantee is desirable: hosts would like to prevent others from determining whether they participate in the network at all. Darknets, or friend-to-friend networks, are one approach to preventing the discovery of hosts within a peer to peer network [1]. In such a network, hosts only form Internet connections with and directly communicate with a small set of hosts whose operators are known and trusted a priori. That is, each user only connects to her friends, trusting that her friends will not reveal her identity or existence in the network.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116087010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish Anti-Phishing Phil:教人们不要上当的游戏设计和评估
Pub Date : 2007-07-18 DOI: 10.1145/1280680.1280692
Steve Sheng, Bryant Magnien, P. Kumaraguru, A. Acquisti, L. Cranor, Jason I. Hong, Elizabeth Ferrall-Nunge
In this paper we describe the design and evaluation of Anti-Phishing Phil, an online game that teaches users good habits to help them avoid phishing attacks. We used learning science principles to design and iteratively refine the game. We evaluated the game through a user study: participants were tested on their ability to identify fraudulent web sites before and after spending 15 minutes engaged in one of three anti-phishing training activities (playing the game, reading an anti-phishing tutorial we created based on the game, or reading existing online training materials). We found that the participants who played the game were better able to identify fraudulent web sites compared to the participants in other conditions. We attribute these effects to both the content of the training messages presented in the game as well as the presentation of these materials in an interactive game format. Our results confirm that games can be an effective way of educating people about phishing and other security attacks.
在本文中,我们描述了Anti-Phishing Phil的设计和评估,这是一个在线游戏,教用户良好的习惯,帮助他们避免网络钓鱼攻击。我们利用科学原理来设计并迭代完善游戏。我们通过一项用户研究来评估这款游戏:参与者在三种反网络钓鱼培训活动(玩游戏,阅读我们基于游戏创建的反网络钓鱼教程,或阅读现有的在线培训材料)中的一种活动前后,分别花15分钟测试他们识别欺诈网站的能力。我们发现,与其他情况下的参与者相比,玩游戏的参与者能够更好地识别欺诈性网站。我们将这些影响归因于游戏中呈现的训练信息的内容以及这些材料在互动游戏格式中的呈现。我们的研究结果证实,游戏可以成为教育人们了解网络钓鱼和其他安全攻击的有效方式。
{"title":"Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish","authors":"Steve Sheng, Bryant Magnien, P. Kumaraguru, A. Acquisti, L. Cranor, Jason I. Hong, Elizabeth Ferrall-Nunge","doi":"10.1145/1280680.1280692","DOIUrl":"https://doi.org/10.1145/1280680.1280692","url":null,"abstract":"In this paper we describe the design and evaluation of Anti-Phishing Phil, an online game that teaches users good habits to help them avoid phishing attacks. We used learning science principles to design and iteratively refine the game. We evaluated the game through a user study: participants were tested on their ability to identify fraudulent web sites before and after spending 15 minutes engaged in one of three anti-phishing training activities (playing the game, reading an anti-phishing tutorial we created based on the game, or reading existing online training materials). We found that the participants who played the game were better able to identify fraudulent web sites compared to the participants in other conditions. We attribute these effects to both the content of the training messages presented in the game as well as the presentation of these materials in an interactive game format. Our results confirm that games can be an effective way of educating people about phishing and other security attacks.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127610332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 550
Seven privacy worries in ubiquitous social computing 无处不在的社交计算带来的七大隐私担忧
Pub Date : 2007-07-18 DOI: 10.1145/1280680.1280713
Sara Gatmir-Motahari, C. Manikopoulos, S. R. Hiltz, Quentin Jones
Review of the literature suggests seven fundamental privacy challenges in the domain of ubiquitous social computing. To date, most research in this area has focused on the features associated with the revelation of personal location data. However, a more holistic view of privacy concerns that acknowledges these seven risks is required if we are to deploy privacy respecting next generation social computing applications. We highlight the threat associated with user inferences made possible by knowledge of the context and use of social ties. We also describe work in progress to both understand user perceptions and build a privacy sensitive urban enclave social computing system.
回顾文献提出了在无处不在的社会计算领域的七个基本隐私挑战。迄今为止,这一领域的大多数研究都集中在与个人位置数据泄露相关的特征上。然而,如果我们要部署尊重下一代社会计算应用程序的隐私,就需要更全面地看待隐私问题,承认这七个风险。我们强调了与用户推断相关的威胁,这些推断是通过对上下文的了解和对社会关系的使用而实现的。我们还描述了正在进行的工作,以了解用户感知和建立隐私敏感的城市飞地社会计算系统。
{"title":"Seven privacy worries in ubiquitous social computing","authors":"Sara Gatmir-Motahari, C. Manikopoulos, S. R. Hiltz, Quentin Jones","doi":"10.1145/1280680.1280713","DOIUrl":"https://doi.org/10.1145/1280680.1280713","url":null,"abstract":"Review of the literature suggests seven fundamental privacy challenges in the domain of ubiquitous social computing. To date, most research in this area has focused on the features associated with the revelation of personal location data. However, a more holistic view of privacy concerns that acknowledges these seven risks is required if we are to deploy privacy respecting next generation social computing applications. We highlight the threat associated with user inferences made possible by knowledge of the context and use of social ties. We also describe work in progress to both understand user perceptions and build a privacy sensitive urban enclave social computing system.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122983068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Detecting, analyzing and responding to security incidents: a qualitative analysis 安全事件的检测、分析和响应:定性分析
Pub Date : 2007-07-18 DOI: 10.1145/1280680.1280702
R. Werlinger, David Botta, K. Beznosov
Persistence and cost are the two factors that have motivated several studies about better practices for dealing with security incidents [5]. However, there is not much literature about IT professionals who have to deal with security incidents, in terms of which tasks they actually perform and which resources they need to handle the complex scenarios given by real incidents [6]. This lack of research makes it difficult to evaluate and improve the support that IT security professionals need to respond efficiently to security incidents.
持久性和成本是促使人们对处理安全事件的更好实践进行研究的两个因素。然而,关于必须处理安全事件的IT专业人员的文献并不多,就他们实际执行哪些任务以及他们需要哪些资源来处理真实事件所给出的复杂场景而言[10]。由于缺乏研究,很难评估和改进it安全专业人员有效响应安全事件所需的支持。
{"title":"Detecting, analyzing and responding to security incidents: a qualitative analysis","authors":"R. Werlinger, David Botta, K. Beznosov","doi":"10.1145/1280680.1280702","DOIUrl":"https://doi.org/10.1145/1280680.1280702","url":null,"abstract":"Persistence and cost are the two factors that have motivated several studies about better practices for dealing with security incidents [5]. However, there is not much literature about IT professionals who have to deal with security incidents, in terms of which tasks they actually perform and which resources they need to handle the complex scenarios given by real incidents [6]. This lack of research makes it difficult to evaluate and improve the support that IT security professionals need to respond efficiently to security incidents.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126279847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Privacy implications for single sign-on authentication in a hospital environment 医院环境中单点登录身份验证的隐私含义
Pub Date : 2007-07-18 DOI: 10.1145/1280680.1280714
Rosa R. Heckle, W. Lutters
Healthcare providers and their IT staff, working in an effort to balance appropriate accessibility with stricter security mandates, are considering the use of a single network sign-on approach for authentication and password management. There is an inherent tension between an authentication mechanism's security strength and the privacy implications of using that authentication technology. This is particularly true with single sign-on authentication. While single sign-on does facilitate authentication, our on-going field work in a regional hospital reveals several unanticipated privacy implications.
医疗保健提供商及其IT人员正在努力平衡适当的可访问性和更严格的安全要求,他们正在考虑使用单一网络登录方法进行身份验证和密码管理。在身份验证机制的安全强度和使用该身份验证技术的隐私含义之间存在固有的紧张关系。单点登录身份验证尤其如此。虽然单点登录确实有助于身份验证,但我们在一家地区医院进行的现场工作揭示了一些意想不到的隐私问题。
{"title":"Privacy implications for single sign-on authentication in a hospital environment","authors":"Rosa R. Heckle, W. Lutters","doi":"10.1145/1280680.1280714","DOIUrl":"https://doi.org/10.1145/1280680.1280714","url":null,"abstract":"Healthcare providers and their IT staff, working in an effort to balance appropriate accessibility with stricter security mandates, are considering the use of a single network sign-on approach for authentication and password management. There is an inherent tension between an authentication mechanism's security strength and the privacy implications of using that authentication technology. This is particularly true with single sign-on authentication. While single sign-on does facilitate authentication, our on-going field work in a regional hospital reveals several unanticipated privacy implications.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126740543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Towards understanding IT security professionals and their tools 了解IT安全专业人员和他们的工具
Pub Date : 2007-07-18 DOI: 10.1145/1280680.1280693
David Botta, R. Werlinger, André Gagné, K. Beznosov, Lee Iverson, S. Fels, Brian D. Fisher
We report preliminary results of our ongoing field study of IT professionals who are involved in security management. We interviewed a dozen practitioners from five organizations to understand their workplace and tools. We analyzed the interviews using a variation of Grounded Theory and predesigned themes. Our results suggest that the job of IT security management is distributed across multiple employees, often affiliated with different organizational units or groups within a unit and responsible for different aspects of it. The workplace of our participants can be characterized by their responsibilities, goals, tasks, and skills. Three skills stand out as significant in the IT security management workplace: inferential analysis, pattern recognition, and bricolage.
我们报告了我们正在进行的对涉及安全管理的IT专业人员的实地研究的初步结果。我们采访了来自五个组织的十几位从业者,以了解他们的工作场所和工具。我们使用扎根理论的变体和预先设计的主题来分析访谈。我们的结果表明,IT安全管理的工作分布在多个员工之间,通常隶属于一个单位内不同的组织单位或小组,并负责它的不同方面。我们的参与者的工作场所可以通过他们的责任、目标、任务和技能来表征。在IT安全管理工作场所中,有三种技能非常重要:推理分析、模式识别和拼凑。
{"title":"Towards understanding IT security professionals and their tools","authors":"David Botta, R. Werlinger, André Gagné, K. Beznosov, Lee Iverson, S. Fels, Brian D. Fisher","doi":"10.1145/1280680.1280693","DOIUrl":"https://doi.org/10.1145/1280680.1280693","url":null,"abstract":"We report preliminary results of our ongoing field study of IT professionals who are involved in security management. We interviewed a dozen practitioners from five organizations to understand their workplace and tools. We analyzed the interviews using a variation of Grounded Theory and predesigned themes. Our results suggest that the job of IT security management is distributed across multiple employees, often affiliated with different organizational units or groups within a unit and responsible for different aspects of it. The workplace of our participants can be characterized by their responsibilities, goals, tasks, and skills. Three skills stand out as significant in the IT security management workplace: inferential analysis, pattern recognition, and bricolage.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121395949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 127
期刊
Symposium On Usable Privacy and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1