Comparing Access-Control Technologies: A Study of Keys and Smartphones

نویسندگان

  • Lujo Bauer
  • Lorrie Cranor
  • Robert W. Reeder
  • Michael K. Reiter
  • Kami Vaniea
چکیده

Significant effort has been invested in developing expressive and flexible access-control languages and systems. However, little work has been done to evaluate these theoretically interesting systems in practical situations with real users, and few attempts have been made to discover and analyze the accesscontrol policies that users actually want to implement. In this paper we report on a study in which we derive the ideal access policies desired by a group of users for physical security in an office environment. We compare these ideal policies to the policies the users actually implemented with keys and with Grey, a smartphone-based distributed access-control system. We show quantitatively that Grey allowed our users to implement their ideal policies more accurately and securely than they could with keys, and describe where each system fell short. As part of this evaluation we identify conditions that users commonly required in their desired policies and explain how these conditions can or cannot be implemented with keys and Grey. Our results and experience can serve to inform the designers of access-control systems about which features these systems should include if they are to successfully meet users’ needs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

کاربرد رایانه‌های جیبی و تلفن‌های هوشمند در دسترسی به اطلاعات سلامت

Background and Aim: Today, one of the challenges of doctors is how they can access medical information as quick as possible. Personal Digital Assistants (PDAs) and Smartphones are such information technologies that can be used to access health information. This study aimed to review the most important uses of Personal Digital Assistants and Smartphones in medicine and in accessing health inform...

متن کامل

Exposure to Visible Light Emitted from Smartphones and Tablets Increases the Proliferation of Staphylococcus aureus: Can this be Linked to Acne?

Background: Due to rapid advances in modern technologies such as telecommunication technology, the world has witnessed an exponential growth in the use of digital handheld devices (e.g. smartphones and tablets). This drastic growth has resulted in increased global concerns about the safety of these devices. Smartphones, tablets, laptops, and other digital screens emit high levels of short-wav...

متن کامل

Access Control and Management System Based on NFC-Technology by the Use of Smart Phones as Keys

In today's world, we always carry all sorts of keys (house keys, garage keys, office keys, car keys) and/or pass cards. Furthermore, we keep all of them in our pockets or wallets; they occupy a lot of space and weigh a lot. In addition to this, we carry gadgets (smart phones, tablets, smart watches, etc.) which are essential in today's life. After thinking all this, authors came up to the idea ...

متن کامل

Secure and Efficient Communication Method in Rogue Access Point Environments

WiFi networks, which have been widely used along with the explosive increases in the supply of smartphones, can provide high network speeds but cannot prevent user information spills though rogue Access Points (APs). Therefore, the present paper proposes a method to exchange SSL session keys through more secure 3G networks to be used in WiFi networks in order to prevent such spills. In the prop...

متن کامل

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007