skip to main content
10.1145/1753846.1754163acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
extended-abstract

Exploring reactive access control

Published: 10 April 2010 Publication History

Abstract

As users store and share more digital content at home, effective access control becomes increasingly important. One promising mechanism for helping non-expert users create accurate access policies is reactive policy creation, in which users can update their policy dynamically in response to access requests that cannot otherwise succeed. An earlier study suggested that reactive policy creation may be a good fit for file access control at home. To test this theory, we designed and piloted an experience sampling study in which participants used a simulated reactive access control system for a week. Preliminary results suggest a neutral to positive response to using this kind of system and indicate that reactive policy creation may help meet users' need for dynamic, contextual policy decisions.

References

[1]
L. Bauer, L. Cranor, R. W. Reeder, M. K. Reiter, and K. Vaniea. Real life challenges in access-control management. In CHI 2009: Conference on Human Factors in Computing Systems, pages 899--908, Apr. 2009.
[2]
L. Bauer, L. F. Cranor, M. K. Reiter, and K. Vaniea. Lessons learned from the deployment of a smartphone-based access-control system. In SOUPS '07: Proceedings of the 3rd Symposium on Usable Privacy and Security, pages 64--75, July 2007.
[3]
S. Consolvo, I. E. Smith, T. Matthews, A. LaMarca, J. Tabert, and P. Powledge. Location disclosure to social relations: why, when, & what people want to share. In CHI '05: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 81--90, New York, NY, USA, 2005. ACM.
[4]
M. L. Mazurek, J. Arsenault, J. Bresee, N. Gupta, I. Ion, C. Johns, D. Lee, Y. Liang, J. Olsen, B. Salmon, R. Shay, K. Vaniea, L. Bauer, L. F. Cranor, G. R. Ganger, and M. K. Reiter. Access control for home data sharing: Attitudes, needs and practices. Technical Report CMU-CyLab-09-013, CyLab, Carnegie Mellon University, Oct. 2009.
[5]
J. S. Olson, J. Grudin, and E. Horvitz. A study of preferences for sharing and privacy. In CHI '05: CHI '05 extended abstracts on Human factors in computing systems, pages 1985--1988, New York, NY, USA, 2005. ACM.
[6]
M. N. Razavi and L. Iverson. A grounded theory of information sharing behavior in a personal learning space. In CSCW '06: Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work, pages 459--468, New York, NY, USA, 2006. ACM.
[7]
R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter, K. Bacon, K. How, and H. Strong. Expandable grids for visualizing and authoring computer security policies. In CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pages 1473--1482, New York, NY, USA, 2008. ACM.

Cited By

View all
  • (2019)Understanding and improving security and privacy in multi-user smart homesProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361350(159-176)Online publication date: 14-Aug-2019

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI EA '10: CHI '10 Extended Abstracts on Human Factors in Computing Systems
April 2010
2219 pages
ISBN:9781605589305
DOI:10.1145/1753846

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 April 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access control
  2. home computing
  3. human factors
  4. privacy

Qualifiers

  • Extended-abstract

Conference

CHI '10
Sponsor:

Acceptance Rates

CHI EA '10 Paper Acceptance Rate 350 of 1,346 submissions, 26%;
Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

Upcoming Conference

CHI 2025
ACM CHI Conference on Human Factors in Computing Systems
April 26 - May 1, 2025
Yokohama , Japan

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Understanding and improving security and privacy in multi-user smart homesProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361350(159-176)Online publication date: 14-Aug-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media