skip to main content
10.1145/1873561.1873564acmconferencesArticle/Chapter ViewAbstractPublication PageschimitConference Proceedingsconference-collections
research-article

Filter-based access control model: exploring a more usable database management

Authors Info & Claims
Published:12 November 2010Publication History

ABSTRACT

In this study, we tested the usability of database management software for end-users. To improve the usability, novel concept Filter based Access Control model (FBAC) and FBAC UI have been developed. We conducted a user test and analyzed the results. In the test, 40 users tried to solve two tasks: 20 used Role based Access Control Model (RBAC) UI, and the rest FBAC UI. In the results, almost no RBAC UI users could complete the tasks, but users who used FBAC completed 40%.

References

  1. Microsoft Office http://office.microsoft.com/enus/professional/Google ScholarGoogle Scholar
  2. Google Spreadsheets http://docs.google.comGoogle ScholarGoogle Scholar
  3. FileMaker http://www.filemaker.com/products/filemaker-pro/?nav=products-proGoogle ScholarGoogle Scholar
  4. Salesforce http://www.salesforce.com/?Country=usGoogle ScholarGoogle Scholar
  5. Nielsen, J. Ten usability heuristics. http://www.useit.com/papers/heuristic/heuristic_list.html, accessed on August 20, 2002.Google ScholarGoogle Scholar
  6. Johnston, J., Eloff, J. H. P. & Labuschagne L. Security and human computer interfaces. Computers & Security, Vol. 22 (8), pp. 675, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Ka-Ping Yee, User Interaction Design for Secure Systems, Proceedings of the 4th International Conference on Information and Communications Security, p. 278--290, December 09--12, 2002 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Brodie, C. A., Karat, C., and Karat, J. 2006. An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench. In Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12--14, 2006). SOUPS '06, vol. 149. ACM, New York, NY, 8--19. DOI=http://doi.acm.org/10.1145/1143120.1143123 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Inglesant, P., Sasse, M. A., Chadwick, D., and Shi, L. L., "Expressions of expertness: the virtuous circle of natural language for access control policy specification", In Proceedings of the 4th Symposium on Usable Privacy and Security (SOUPS '08), pp. 77--88, 23--25 July, 2008 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Vaniea, K., Ni, Q., Cranor, L., and Bertino, E., "Access control policy analysis and visualization tools for security professionals", In Proceedings of the 4th Symposium on Usable Privacy and Security (SOUPS '08)Google ScholarGoogle Scholar
  11. Smith, S. W. Humans in the Loop: Human-Computer Interaction and Security, IEEE Security and Privacy, v. 1 n. 3, p. 75--79, May 2003 {doi>10.1109/MSECP.2003.1203228} Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Ka-Ping Yee, Aligning Security and Usability, IEEE Security and Privacy, v.2 n.5, p.48--55, September 2004 {doi>10.1109/MSP.2004.64} Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Raja, F., Hawkey, K., and Beznosov, K. 2009. Revealing hidden context: improving mental models of personal firewall users. In Proceedings of the 5th Symposium on Usable Privacy and Security (Mountain View, California, July 15--17, 2009). SOUPS '09. ACM, New York, NY, 1--12. DOI= http://doi.acm.org/10.1145/1572532.1572534 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Karwowski, W. International Encyclopedia of Ergonomics and Human Factors, Second Edition - 3 Volume Set, CRC Press, Inc., Boca Raton, FL, 2006 Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Lopez, J., Oppliger, R., and Pernul, G. 2005. "Authentication and authorization infrastructures (AAIs): a comparative survey", Computers & Security, vol. 23, 2004, 578--590.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Ko, A. J., Myers, B. A. and Aung, H. H. Six Learning Barriers in End-User Programming Systems, Proceedings of the 2004 IEEE Symposium on Visual Languages - Human Centric Computing (VLHCC'04), p.199--206, September 26--29, 2004 {doi>10.1109/VLHCC.2004.47} Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Tanimoto, S. L. (2003), Programming in a Data Factory, in 'Proceedings of Human Centric Computing Language and Environments', pp. 100--108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Graham, G. S. and Denning, P. J. 1972. Protection: principles and practice. In Proceedings of the May 16--18, 1972, Spring Joint Computer Conference (Atlantic City, New Jersey, May 16--18, 1972). AFIPS '72 (Spring). ACM, New York, NY, 417--429. DOI= http://doi.acm.org/10.1145/1478873.1478928 Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Chaffer, J. and Swedberg, K. 2007 Learning Jquery: Better Interaction Design and Web Development with Simple Javascript Techniques. Packt Publishing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Ueno, N., Hashimoto, R., Shimomura, M., and Takahashi, K. 2009. Soramame: what you see is what you control access control user interface. In Proceedings of the Symposium on Computer Human interaction For the Management of information Technology (Baltimore, Maryland, November 07--08, 2009). CHiMiT '09. ACM, New York, NY, 38--41. DOI= http://doi.acm.org/10.1145/1641587.1641592 Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Smetters, D. K. and Good, N. 2009. How users use access control. In Proceedings of the 5th Symposium on Usable Privacy and Security (Mountain View, California, July 15--17, 2009). SOUPS '09. ACM, New York, NY, 1--12. DOI= http://doi.acm.org/10.1145/1572532.1572552 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Filter-based access control model: exploring a more usable database management

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHiMiT '10: Proceedings of the 4th Symposium on Computer Human Interaction for the Management of Information Technology
      November 2010
      61 pages
      ISBN:9781450304474
      DOI:10.1145/1873561

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 November 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate15of43submissions,35%
    • Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader