Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Formal definitions for usable access control rule sets from goals to metrics
Beckerle M., Martucci L.  SOUPS 2013 (Proceedings of the 9th Symposium on Usable Privacy and Security, Newcastle, UK, Jul 24-26, 2013)1-11.2013.Type:Proceedings
Date Reviewed: May 28 2014

The usability and manageability of access control policies in an attribute-based access control (ABAC) setting are the main focus of this paper. The authors aim to provide a scientific way to obtain a usable access control rule set.

If we had clear and simple access control rules, it would be trivial to enforce the separation of duties. In fact, with ABAC models, few theoretical results have been found to formally prove that a given policy respects the aforementioned security concepts due to the complexity that the attribute/policy couple may have. This is even more complicated in policy-based access control, where the policy is not a set of attributes to be matched; rather, the policy evaluation is dependent on an external context, since it may contain code fragments written in a programming language (such as Extensible Access Control Markup Language (XACML)).

Thus, a method that users can exploit to (in)formally define the function “policy x is more usable than policy y” is extremely important (and challenging). The authors stress the fact that both IT experts and non-experts can manage the access control policies.

The study is structured as follows. With the help of volunteers, the authors ran a first pilot with IT administrators to define “six goals for building usable and secure access control rule sets.” Such rules were formalized and metrics were attached. The authors then conducted two chained user studies; the output of the first study was used as input on the second user study in order to evaluate how helpful the found metrics were to users in creating new rule sets. The approach was validated by testing three different hypotheses. Although there are some known limitations, the results are encouraging.

Reviewer:  Massimiliano Masi Review #: CR142325 (1408-0670)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
User/ Machine Systems (H.1.2 )
 
 
Access Controls (D.4.6 ... )
 
 
Complexity Measures (D.2.8 ... )
 
 
Metrics (D.2.8 )
 
Would you recommend this review?
yes
no
Other reviews under "User/Machine Systems": Date
The future of interactive systems and the emergence of direct manipulation
Shneiderman B.  Human factors and interactive computer systems (, New York,281984. Type: Proceedings
May 1 1985
Reading continuous text from a one-line visual display
Monk A. International Journal of Man-Machine Studies 21(3): 269-277, 1984. Type: Article
Oct 1 1985
Readings on cognitive ergonomics - mind and computers
van der Veer G., Tauber M. (ed), Green T. (ed), Gorny P. (ed)  Readings on cognitive ergonomics - mind and computers,Gmunden, Austria,1984. Type: Whole Proceedings
May 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy