{"title":"所有可用的访问控制","authors":"R. Reeder","doi":"10.1145/1998441.1998469","DOIUrl":null,"url":null,"abstract":"PANEL SUMMARY Managing access-control policies has traditionally been the domain of information security experts or system administrators, but is increasingly performed by individual consumers who may have no technical expertise. A variety of new applications create the need for consumers to use access control, including online social networks, online healthcare records databases, location-based mobile applications, mobile application stores, and cloud-based file shares. With these applications, data that is both personal and highly sensitive is being moved online, where it can be conveniently accessed by others. There are great benefits to be gained by making this sensitive data available to some--for example, by making an individual’s medical history available to healthcare providers---and great risks to making the data available to others---for example, making location data available to stalkers. Access-control technologies thus become the gateway to enabling applications to provide value through sharing data while keeping that data safe from those who should not be allowed to have it.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"5 1","pages":"153-154"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Usable access control for all\",\"authors\":\"R. Reeder\",\"doi\":\"10.1145/1998441.1998469\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"PANEL SUMMARY Managing access-control policies has traditionally been the domain of information security experts or system administrators, but is increasingly performed by individual consumers who may have no technical expertise. A variety of new applications create the need for consumers to use access control, including online social networks, online healthcare records databases, location-based mobile applications, mobile application stores, and cloud-based file shares. With these applications, data that is both personal and highly sensitive is being moved online, where it can be conveniently accessed by others. There are great benefits to be gained by making this sensitive data available to some--for example, by making an individual’s medical history available to healthcare providers---and great risks to making the data available to others---for example, making location data available to stalkers. Access-control technologies thus become the gateway to enabling applications to provide value through sharing data while keeping that data safe from those who should not be allowed to have it.\",\"PeriodicalId\":74509,\"journal\":{\"name\":\"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies\",\"volume\":\"5 1\",\"pages\":\"153-154\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-06-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1998441.1998469\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1998441.1998469","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

管理访问控制策略传统上是信息安全专家或系统管理员的领域,但越来越多地由可能没有技术专长的个人消费者执行。各种新应用程序为消费者提供了使用访问控制的需求,包括在线社交网络、在线医疗记录数据库、基于位置的移动应用程序、移动应用程序商店和基于云的文件共享。通过这些应用程序,个人和高度敏感的数据被转移到网上,其他人可以方便地访问这些数据。将这些敏感数据提供给某些人(例如,将个人的病史提供给医疗保健提供者)会带来巨大的好处,而将数据提供给其他人(例如,将位置数据提供给跟踪者)则会带来巨大的风险。因此,访问控制技术成为使应用程序能够通过共享数据来提供价值的门户,同时保证数据的安全,不让那些不应该被允许拥有它的人获得。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Usable access control for all
PANEL SUMMARY Managing access-control policies has traditionally been the domain of information security experts or system administrators, but is increasingly performed by individual consumers who may have no technical expertise. A variety of new applications create the need for consumers to use access control, including online social networks, online healthcare records databases, location-based mobile applications, mobile application stores, and cloud-based file shares. With these applications, data that is both personal and highly sensitive is being moved online, where it can be conveniently accessed by others. There are great benefits to be gained by making this sensitive data available to some--for example, by making an individual’s medical history available to healthcare providers---and great risks to making the data available to others---for example, making location data available to stalkers. Access-control technologies thus become the gateway to enabling applications to provide value through sharing data while keeping that data safe from those who should not be allowed to have it.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Sidecar-based Path-aware Security for Microservices Poster: How to Raise a Robot - Beyond Access Control Constraints in Assistive Humanoid Robots Demo: A Multimodal Behavioral Biometric Scheme for Smartphone User Authentication (MBBS) Qualitative Intention-aware Attribute-based Access Control Policy Refinement SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1