Symposium On Usable Privacy and Security最新文献

筛选
英文 中文
Aligning usability and security: a usability study of Polaris 对齐可用性和安全性:北极星的可用性研究
Symposium On Usable Privacy and Security Pub Date : 2006-07-12 DOI: 10.1145/1143120.1143122
Alexander J. DeWitt, J. Kuljis
{"title":"Aligning usability and security: a usability study of Polaris","authors":"Alexander J. DeWitt, J. Kuljis","doi":"10.1145/1143120.1143122","DOIUrl":"https://doi.org/10.1145/1143120.1143122","url":null,"abstract":"Security software is often difficult to use thus leading to poor adoption and degraded security. This paper describes a usability study that was conducted on the software 'Polaris'. This software is an alpha release that uses the Principle of Least Authority (POLA) to deny viruses the authority to edit files. Polaris was designed to align security with usability. The study showed that despite this aim, usability problems remained, especially when the study participants had to make security related decisions. They also showed apathy towards security, and knowingly compromised their security to get work done faster. This study also demonstrates the difficulty in achieving security and usability alignment when the usability is a post hoc consideration added to a developed product, rather than being integrated from the start. The alleviation of usability problems from security software proposed in this paper are threefold: reducing the burden on the user to make security related decisions, counteracting user's apathy by ensuring that the fast way of doing things is the secure way, and integrating security software with the operating system throughout development.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124395649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Intentional access management: making access control usable for end-users 有意访问管理:使访问控制对最终用户可用
Symposium On Usable Privacy and Security Pub Date : 2006-07-12 DOI: 10.1145/1143120.1143124
X. Cao, Lee Iverson
{"title":"Intentional access management: making access control usable for end-users","authors":"X. Cao, Lee Iverson","doi":"10.1145/1143120.1143124","DOIUrl":"https://doi.org/10.1145/1143120.1143124","url":null,"abstract":"The usability of access control mechanisms in modern distributed systems has been widely criticized but little studied. In this paper, we carefully examine one such widely deployed access control mechanism, the one embedded in the WebDAV standard, from the point-of-view of an end-user trying to decide how to grant or deny access to some resource to a third party. This analysis points to problems with the conceptual usability of the system. Significant effort is required on the part of the user to determine how to implement the desired access rules; the user, however, has low interest and expertise in this task, given that such access management actions are almost always secondary to the collaborative task at hand. The analysis does however indicate a possible solution: to recast the access control puzzle as a decision support problem in which user intentions (i.e. the descriptions of desired system outputs) are interpreted by an access mediator that either automatically or semi-automatically decides how to achieve the designated goals and provides enough feedback to the user. We call such systems intentional access management (IAM) systems and describe them in both specific and general terms. To demonstrate the feasibility and usability of the proposed IAM models, we develop an intentional access management prototype for WebDAV. The results of a user study conducted on the system show its superior usability compared to traditional access management tools like the access control list editor.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127393520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench 使用SPARCLE策略工作台对隐私策略规则进行自然语言解析的实证研究
Symposium On Usable Privacy and Security Pub Date : 2006-07-12 DOI: 10.1145/1143120.1143123
C. Brodie, Clare-Marie Karat, J. Karat
{"title":"An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench","authors":"C. Brodie, Clare-Marie Karat, J. Karat","doi":"10.1145/1143120.1143123","DOIUrl":"https://doi.org/10.1145/1143120.1143123","url":null,"abstract":"Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, our human-centered research has focused on understanding organizational privacy management needs, and, based on those needs, creating a usable and effective policy workbench called SPARCLE. SPARCLE will enable organizational users to enter policies in natural language, parse the policies to identify policy elements and then generate a machine readable (XML) version of the policy. In the future, SPARCLE will then enable mapping of policies to the organization's configuration and provide audit and compliance tools to ensure that the policy implementation operates as intended. In this paper, we present the strategies employed in the design and implementation of the natural language parsing capabilities that are part of the functional version of the SPARCLE authoring utility. We have created a set of grammars which execute on a shallow parser that are designed to identify the rule elements in privacy policy rules. We present empirical usability evaluation data from target organizational users of the SPARCLE system and highlight the parsing accuracy of the system with the organizations' privacy policies. The successful implementation of the parsing capabilities is an important step towards our goal of providing a usable and effective method for organizations to link the natural language version of privacy policies to their implementation, and subsequent verification through compliance auditing of the enforcement logs.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127907753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 153
Seeing further: extending visualization as a basis for usable security 进一步看:扩展可视化作为可用安全性的基础
Symposium On Usable Privacy and Security Pub Date : 2006-07-12 DOI: 10.1145/1143120.1143138
J. Rode, C. Johansson, Paul DiGioia, R. S. Filho, K. Nies, David H. Nguyen, J. Ren, P. Dourish, D. Redmiles
{"title":"Seeing further: extending visualization as a basis for usable security","authors":"J. Rode, C. Johansson, Paul DiGioia, R. S. Filho, K. Nies, David H. Nguyen, J. Ren, P. Dourish, D. Redmiles","doi":"10.1145/1143120.1143138","DOIUrl":"https://doi.org/10.1145/1143120.1143138","url":null,"abstract":"The focus of our approach to the usability considerations of privacy and security has been on providing people with information they can use to understand the implications of their interactions with a system, as well as, to assess whether or not a system is secure enough for their immediate needs. To this end, we have been exploring two design principles for secure interaction: visualizing system activity and integrating configuration and action. Here we discuss the results of a user study designed as a broad formative examination of the successes and failures of an initial prototype based around these principles. Our response to the results of this study has been twofold. First, we have fixed a number of implementation and usability problems. Second, we have extended our visualizations to incorporate new considerations regarding the temporal and structural organization of interactions.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122969487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
The methodology and an application to fight against Unicode attacks 对抗Unicode攻击的方法和应用程序
Symposium On Usable Privacy and Security Pub Date : 2006-07-12 DOI: 10.1145/1143120.1143132
Anthony Y. Fu, Xiaotie Deng, Wenyin Liu, Greg Little
{"title":"The methodology and an application to fight against Unicode attacks","authors":"Anthony Y. Fu, Xiaotie Deng, Wenyin Liu, Greg Little","doi":"10.1145/1143120.1143132","DOIUrl":"https://doi.org/10.1145/1143120.1143132","url":null,"abstract":"Unicode is becoming a dominant character representation format for information processing. This presents a very dangerous usability and security problem for many applications. The problem arises because many characters in the UCS (Universal Character Set) are visually and/or semantically similar to each other. This presents a mechanism for malicious people to carry out Unicode Attacks, which include spam attacks, phishing attacks, and web identity attacks. In this paper, we address the potential attacks, and propose a methodology for countering them. To evaluate the feasibility of our methodology, we construct a Unicode Character Similarity List (UC-SimList). We then implement a visual and semantic based edit distance (VSED), as well as a visual and semantic based Knuth-Morris-Pratt algorithm (VSKMP), to detect Unicode attacks. We develop a prototype Unicode attack detection tool, IDN-SecuChecker, which detects phishing weblinks and fake user name (account) attacks. We also introduce the possible practical use of Unicode attack detectors.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128224243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Privacy and security threat analysis of the federal employee personal identity verification (PIV) program 联邦雇员个人身份验证(PIV)计划的隐私和安全威胁分析
Symposium On Usable Privacy and Security Pub Date : 2006-07-12 DOI: 10.1145/1143120.1143135
P. Karger
{"title":"Privacy and security threat analysis of the federal employee personal identity verification (PIV) program","authors":"P. Karger","doi":"10.1145/1143120.1143135","DOIUrl":"https://doi.org/10.1145/1143120.1143135","url":null,"abstract":"This paper is a security and privacy threat analysis of new Federal Information Processing Standard for Personal Identity Verification (FIPS PUB 201). It identifies some problems with the standard, and it proposes solutions to those problems, using standardized cryptographic techniques that are based on the Internet Key Exchange (IKE) protocol [16]. When the standard is viewed in the abstract, it seems to effectively provide security and privacy, because it uses strong cryptographic algorithms. However, when you examine the standard in the context of potential user scenarios regarding its use; security, privacy, and usability problems can be identified. User scenarios are employed to provide the context for the identification of these problems, and the technical solutions are described to address the issues raised.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131439221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Power strips, prophylactics, and privacy, oh my! 电源板,预防用品,还有隐私,天哪!
Symposium On Usable Privacy and Security Pub Date : 2006-07-12 DOI: 10.1145/1143120.1143137
J. Gideon, L. Cranor, Serge Egelman, A. Acquisti
{"title":"Power strips, prophylactics, and privacy, oh my!","authors":"J. Gideon, L. Cranor, Serge Egelman, A. Acquisti","doi":"10.1145/1143120.1143137","DOIUrl":"https://doi.org/10.1145/1143120.1143137","url":null,"abstract":"While Internet users claim to be concerned about online privacy, their behavior rarely reflects those concerns. In this paper we investigate whether the availability of comparison information about the privacy practices of online merchants affects users' behavior. We conducted our study using Privacy Finder, a \"privacy-enhanced search engine\" that displays search results annotated with the privacy policy information of each site. The privacy information is garnered from computer-readable privacy policies found at the respective sites. We asked users to purchase one non-privacy-sensitive item and then one privacy-sensitive item using Privacy Finder, and observed whether the privacy information provided by our search engine impacted users' purchasing decisions (participants' costs were reimbursed, in order to separate the effect of privacy policies from that of price). A control group was asked to make the same purchases using a search engine that produced the same results as Privacy Finder, but did not display privacy information. We found that while Privacy Finder had some influence on non-privacy-sensitive purchase decisions, it had a more significant impact on privacy-sensitive purchases. The results suggest that when privacy policy comparison information is readily available, individuals may be willing to seek out more privacy friendly web sites and perhaps even pay a premium for privacy depending on the nature of the items to be purchased.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125226682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Password management strategies for online accounts 网上帐户的密码管理策略
Symposium On Usable Privacy and Security Pub Date : 2006-07-12 DOI: 10.1145/1143120.1143127
Shirley Gaw, E. Felten
{"title":"Password management strategies for online accounts","authors":"Shirley Gaw, E. Felten","doi":"10.1145/1143120.1143127","DOIUrl":"https://doi.org/10.1145/1143120.1143127","url":null,"abstract":"Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse their passwords across multiple accounts, they increase their vulnerability; compromising one password can help an attacker take over several accounts. Our study of 49 undergraduates quantifies how many passwords they had and how often they reused these passwords. The majority of users had three or fewer passwords and passwords were reused twice. Furthermore, over time, password reuse rates increased because people accumulated more accounts but did not create more passwords. Users justified their habits. While they wanted to protect financial data and personal communication, reusing passwords made passwords easier to manage. Users visualized threats from human attackers, particularly viewing those close to them as the most motivated and able attackers; however, participants did not separate the human attackers from their potentially automated tools. They sometimes failed to realize that personalized passwords such as phone numbers can be cracked given a large enough dictionary and enough tries. We discuss how current systems support poor password practices. We also present potential changes in website authentication systems and password managers.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130628742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 419
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords 字母数字密码和图形密码之间的感知风险和真实风险的比较
Symposium On Usable Privacy and Security Pub Date : 2006-07-12 DOI: 10.1145/1143120.1143128
F. Tari, A. A. Ozok, Stephen H. Holden
{"title":"A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords","authors":"F. Tari, A. A. Ozok, Stephen H. Holden","doi":"10.1145/1143120.1143128","DOIUrl":"https://doi.org/10.1145/1143120.1143128","url":null,"abstract":"Previous research has found graphical passwords to be more memorable than non-dictionary or \"strong\" alphanumeric passwords. Participants in a prior study expressed concerns that this increase in memorability could also lead to an increased susceptibility of graphical passwords to shoulder-surfing. This appears to be yet another example of the classic trade-off between usability and security for authentication systems. This paper explores whether graphical passwords' increased memorability necessarily leads to risks of shoulder-surfing. To date, there are no studies examining the vulnerability of graphical versus alphanumeric passwords to shoulder-surfing.This paper examines the real and perceived vulnerability to shoulder-surfing of two configurations of a graphical password, Passfaces™[30], compared to non-dictionary and dictionary passwords. A laboratory experiment with 20 participants asked them to try to shoulder surf the two configurations of Passfaces™ (mouse versus keyboard data entry) and strong and weak passwords. Data gathered included the vulnerability of the four authentication system configurations to shoulder-surfing and study participants' perceptions concerning the same vulnerability. An analysis of these data compared the relative vulnerability of each of the four configurations to shoulder-surfing and also compared study participants' real and perceived success in shoulder-surfing each of the configurations. Further analysis examined the relationship between study participants' real and perceived success in shoulder-surfing and determined whether there were significant differences in the vulnerability of the four authentication configurations to shoulder-surfing.Findings indicate that configuring data entry for Passfaces™ through a keyboard is the most effective deterrent to shoulder-surfing in a laboratory setting and the participants' perceptions were consistent with that result. While study participants believed that Passfaces™ with mouse data entry would be most vulnerable to shoulder-surfing attacks, the empirical results found that strong passwords were actually more vulnerable.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133873021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 325
Social navigation as a model for usable security 社交导航作为可用安全性的模型
Symposium On Usable Privacy and Security Pub Date : 2005-07-06 DOI: 10.1145/1073001.1073011
Paul DiGioia, P. Dourish
{"title":"Social navigation as a model for usable security","authors":"Paul DiGioia, P. Dourish","doi":"10.1145/1073001.1073011","DOIUrl":"https://doi.org/10.1145/1073001.1073011","url":null,"abstract":"As interest in usable security spreads, the use of visual approaches in which the functioning of a distributed system is made visually available to end users is an approach that a number of researchers have examined. In this paper, we discuss the use of the social navigation paradigm as a way of organizing visual displays of system action. Drawing on a previous study of security in the Kazaa peer to peer system, we present some examples of the ways in which social navigation can be incorporated in support of usable security.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122129776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信