skip to main content
10.1145/2335356.2335375acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

Relating declarative semantics and usability in access control

Published:11 July 2012Publication History

ABSTRACT

Usability is widely recognized as a problem in the context of the administration of access control systems. We seek to relate the notion of declarative semantics, a recurring theme in research in access control, with usability. We adopt the concrete context of POSIX ACLs and the traditional interface for it that comprises two utilities getfacl and setfacl whose natural semantics is operational. We have designed and implemented an alternate interface that we call askfacl whose natural semantics is declarative. We discuss our design of askfacl. We then discuss a human-subject usability study that we have designed and conducted that compares the two interfaces. Our results measurably demonstrate the goodness of declarative semantics in access control.

References

  1. Publication manual of the American Psychological Association. American Psychological Association, 6 edition, 2010.Google ScholarGoogle Scholar
  2. The linux kernel archives, Mar. 2012. http://www.kernel.org/.Google ScholarGoogle Scholar
  3. OpenBSD, Mar. 2012. http://www.openbsd.org/.Google ScholarGoogle Scholar
  4. Reporting statistics in APA format, Mar. 2012. Available from http://www.writingcenter.uconn.edu/pdf/Reporting_Statistics.pdf.Google ScholarGoogle Scholar
  5. script - make typescript of terminal session, Mar. 2012. http://unixhelp.ed.ac.uk/CGI/man-cgi?script.Google ScholarGoogle Scholar
  6. L. Bauer, L. F. Cranor, R. W. Reeder, M. K. Reiter, and K. Vaniea. A user study of policy creation in a flexible access-control system. In CHI 2008 Proceedings - Policy, Telemedicine, and Enterprise, pages 543--552, Apr. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. L. Bauer, L. F. Cranor, R. W. Reeder, M. K. Reiter, and K. Vaniea. Real life challenges in access-control management. In CHI 2009 Proceedings - Security, pages 899--908, Apr. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Y. Benjamini and Y. Hochberg. Controlling the false discovery rate: a practical and powerful approach to multiple testing. J. Roy. Statist. Soc. Ser. B, 57(1):289--300, 1995.Google ScholarGoogle ScholarCross RefCross Ref
  9. M. Bishop. Introduction to Computer Security. Addison-Wesley, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. X. Cao and L. Iverson. Intentional access management: Making access control usable for end-users. In Proceedings of the second Symposium on Usable Privacy and Security (SOUPS), pages 20--31, July 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. A. Fisher. Statistical Methods for Research Workers. Oliver and Boyd, 1925.Google ScholarGoogle Scholar
  12. D. Garg, L. Bauer, K. Bowers, F. Pfenning, and M. Reiter. A linear logic of authorization and knowledge. In D. Gollmann, J. Meier, and A. Sabelfeld, editors, Computer Security - ESORICS 2006, volume 4189 of Lecture Notes in Computer Science, pages 297--312. Springer Berlin/Heidelberg, 2006. 10.1007/11863908 19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Huth and M. Ryan. Logic in Computer Science. Cambridge University Press, Cambridge, UK, 2nd edition, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. L. Johnson, S. M. Bellovin, R. W. Reeder, and S. E. Schechter. Laizzez-faire file sharing. In Proceedings of the New Security Paradigms Workshop (NSPW'09), Sept. 2009.Google ScholarGoogle Scholar
  15. J. Karat, C.-M. Karat, C. Brodie, and J. Feng. Privacy in information technology: Designing to enable privacy policy management in organizations. International Journal of Human-Computer Studies, 63(1-2):153--174, July 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. B. Kirwan. A Guide To Practical Human Reliability Assessment. CRC Press, Nov. 1994.Google ScholarGoogle Scholar
  17. N. Li, J. Mitchell, and W. Winsborough. Design of a role-based trust-management framework. In Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on, pages 114--130, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. R. A. Maxion and R. W. Reeder. Improving user-interface dependability through mitigation of human error. International Journal of Human-Computer Studies, 63(1--2):25--50, July 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. C. Mont, R. Thyne, and P. Bramhall. Privacy enforcement with hp select access for regulatory compliance. Technical report, HP Labs, Bristol, UK, Jan. 2008.Google ScholarGoogle Scholar
  20. N. Nachar. The Mann-Whitney U: A test for assessing whether two independent samples come from the same distribution. Tutorials in Quantitative Methods for Psychology, 4(1):13--20, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  21. G. D. Plotkin. The origins of structural operational semantics. Journal of Logic and Algebraic Programming, 60-61:3--15, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  22. R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter, K. Bacon, K. How, and H. Strong. Expandable grids for visualizing and authoring computer security policies. In CHI 2008 Proceedings - Visualizations, pages 1473--1482. ACM, Apr. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter, and K. Vaniea. More than skin deep: measuring effects of the underlying model on access-control system usability. In Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pages 2065--2074, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J. Rode, C. Johansson, P. DiGioia, R. S Filho, K. Nies, D. H. Nguyen, J. Ren, P. Dourish, and D. Redmiles. Seeing further: Extending visualization as a basis for usable security. In Proceedings of the Second Symposium on Usable Privacy and Security (SOUPS), pages 145--155, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. S. Schechter. Common pitfalls in writing about security and privacy human subjects experiments, and how to avoid them, 2012. Available from https://cups.cs.cmu.edu/soups/2010/howtosoups.pdf.Google ScholarGoogle Scholar
  26. F. B. Schneider, K. Walsh, and E. G. Sirer. Nexus authorization logic (NAL): Design rationale and applications. ACM Trans. Inf. Syst. Secur., 14(1):8:1--8:28, June 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Security Working Group, IEEE Computer Society. IEEE 1003.1e and 1003.2c: Draft Standard for Information Technology--Portable Operating System Interface (POSIX)--Part 1: System Application Program Interface (API) and Part 2: Shell and Utilities, draft 17 (withdrawn). Available from http://ece.uwaterloo.ca/~tripunit/Posix1003.1e990310.pdf, Oct. 1997.Google ScholarGoogle Scholar
  28. D. K. Smetters and N. Good. How users use access control. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), July 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. M. E. Zurko, R. Simon, and T. Sanfflippo. A user-centered, modular authorization service built on an RBAC foundation. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, pages 57--71, May 1999.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Relating declarative semantics and usability in access control

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SOUPS '12: Proceedings of the Eighth Symposium on Usable Privacy and Security
          July 2012
          216 pages
          ISBN:9781450315326
          DOI:10.1145/2335356

          Copyright © 2012 Authors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 11 July 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate15of49submissions,31%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader