Comparing Access-Control Technologies: A Study of Keys and Smartphones
نویسندگان
چکیده
Significant effort has been invested in developing expressive and flexible access-control languages and systems. However, little work has been done to evaluate these theoretically interesting systems in practical situations with real users, and few attempts have been made to discover and analyze the accesscontrol policies that users actually want to implement. In this paper we report on a study in which we derive the ideal access policies desired by a group of users for physical security in an office environment. We compare these ideal policies to the policies the users actually implemented with keys and with Grey, a smartphone-based distributed access-control system. We show quantitatively that Grey allowed our users to implement their ideal policies more accurately and securely than they could with keys, and describe where each system fell short. As part of this evaluation we identify conditions that users commonly required in their desired policies and explain how these conditions can or cannot be implemented with keys and Grey. Our results and experience can serve to inform the designers of access-control systems about which features these systems should include if they are to successfully meet users’ needs.
منابع مشابه
کاربرد رایانههای جیبی و تلفنهای هوشمند در دسترسی به اطلاعات سلامت
Background and Aim: Today, one of the challenges of doctors is how they can access medical information as quick as possible. Personal Digital Assistants (PDAs) and Smartphones are such information technologies that can be used to access health information. This study aimed to review the most important uses of Personal Digital Assistants and Smartphones in medicine and in accessing health inform...
متن کاملExposure to Visible Light Emitted from Smartphones and Tablets Increases the Proliferation of Staphylococcus aureus: Can this be Linked to Acne?
Background: Due to rapid advances in modern technologies such as telecommunication technology, the world has witnessed an exponential growth in the use of digital handheld devices (e.g. smartphones and tablets). This drastic growth has resulted in increased global concerns about the safety of these devices. Smartphones, tablets, laptops, and other digital screens emit high levels of short-wav...
متن کاملAccess Control and Management System Based on NFC-Technology by the Use of Smart Phones as Keys
In today's world, we always carry all sorts of keys (house keys, garage keys, office keys, car keys) and/or pass cards. Furthermore, we keep all of them in our pockets or wallets; they occupy a lot of space and weigh a lot. In addition to this, we carry gadgets (smart phones, tablets, smart watches, etc.) which are essential in today's life. After thinking all this, authors came up to the idea ...
متن کاملSecure and Efficient Communication Method in Rogue Access Point Environments
WiFi networks, which have been widely used along with the explosive increases in the supply of smartphones, can provide high network speeds but cannot prevent user information spills though rogue Access Points (APs). Therefore, the present paper proposes a method to exchange SSL session keys through more secure 3G networks to be used in WiFi networks in order to prevent such spills. In the prop...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کامل