Abstract
Managing access control (AC) of shared resources is at the heart of any collaboration platform. Thereby, the usability of used AC techniques is crucial for projects with high expectations to fast response times within targeted collaboration processes. In this paper, we address the special case of using the anonymous credential system idemix in a project dealing with distributed user interfaces (DUIs) to enhance decision making in disaster situations. We show the potential of using idemix to enhance the usability of decision making in crisis situations by using DUIs while considering security and privacy. We present this exemplary by means of a developed prototypic collaborative environment, composed by a WallShare based server-side and mobile application for supporting collaborative scenarios within the ReSCUeIT project. Since DUI based collaboration demands wide-support of multiple devices, especially mobile ones, we further present IdeREST, a REST-full idemix integration and idemiX++, the first C++ based implementation of idemix worldwide, to the best of our knowledge. With both we show how to overcome the current gap related to the simultaneous support on non-Java devices such as Windows Phone 7/8 along with performance improvements on Android based platforms when using idemix as an exemplary anonymous credential system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
ReSCUeIT: Robust and secure supply-chain supporting IT. http://www.sichere-warenketten.de
- 2.
di.me: Integrated digital.me Userware. http://www.dime-project.eu
References
Hong, J. I., & Landay, J. A. (2004). An architecture for privacy-sensitive ubiquitous computing. MobiSys’04: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services (pp. 177–189). ACM, New York.
Cranor, L., & Garfinkel, S. (2005). Security and usability. Sebastopol: O’Reilly Media.
Palen, L., & Dourish, P. (2003). Unpacking “privacy” for a networked world. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’03) (pp. 129–136). ACM Press, New York.
Shneiderman, B., Plaisant, C., Cohen, M., & Jacobs, S. (2010). Designing the user interface: Strategies for effective human-computer interaction (5th ed.). Reading: Addison Wesley.
Boyle, M., Neustaedter, C., & Greenberg, S. (2008). Privacy factors in video-based media spaces. In S. Harrision (Ed.), Media space: 20+ years of mediated life (pp. 99–124). Berlin: Springer.
Bullock, A., & Benford, S. (1999). An access control framework for multi-user collaborative environments. Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work. GROUP’99 (pp. 140–149). ACM, New York.
Haake, J. M., Haake, A., Schu ̈mmer, T., Bourimi, M., & Landgraf, B. (2004). End-user controlled group formation and access rights management in a shared workspace system. CSCW’04: Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work (pp. 554–563). ACM Press, Chicago, 6–10 Nov 2004.
Camenisch, J., & Van Herreweghen, E. (2002). Design and implementation of the idemix anonymous credential system. CCS’02: Proceedings of the 9th ACM Conference on Computer and Communications Security (pp. 21–30). ACM, New York.
Bichsel, P., & Camenisch, J. (2010). Mixing identities with ease. In E. De Leeuw, S. Fischer-Hübner, & L. Fritsch (Eds.), IFIP working conference on policies: Research in identity management (IDMAN’10) (pp. 1–17). Springer.
Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., & Smith, J. M. (2010). Smudge attacks on smartphone touch screens. Proceedings of the 4th USENIX Conference on Offensive Technologies. WOOT’10, Berkeley (pp. 1–7). USENIX Association.
Kryszczuk, K., & Drygajlo, A. (2008). Credence estimation and error prediction in biometric identity verification. Signal Processing, 88(4), 916–925.
Corella, F., & Lewison, K. (2012). Strong and convenient multi-factor authentication on mobiles devices.
Schwarte, P., Bourimi, M., Heupel, M., Kesdogan, D., Gimenez R., Wrobel, S., & Thiel, S. (2013). Multilaterally secure communication anonymity in decentralized social networking. To appear in: Proceedings of the 10th International Conference on Information Technology: New Generations (ITNG), Las Vegas.
Barth, T., Fielenbach, T., Bourimi, M., Kesdogan, D., & Villanueva, P. (2011). Supporting distributed decision making using secure distributed user interfaces. In J. A. Gallud, R. Tesoriero, & V. M. Penichet (Eds.), Distributed user interfaces (Human-computer interaction series, pp. 177–184). London: Springer.
Heupel, M. (2010). Porting and evaluating the performance of idemix and tor anonymity on modern smartphones. Master’s thesis, University of Siegen.
Villanueva, P. G., Gallud, J. A., & Tesoriero, R. (2010). WallShare: A multi-pointer system for portable devices. AVI’10: Proceedings of the International Conference on Advanced Visual Interfaces, ACM Request Permissions.
Acknowledgements
This work has been partially supported by the joint project ReSCUeIT, funded by the German Federal Ministry of Education and Research (BMBF) and the French L’Agence nationale de la recherché (ANR) under grant no. 13N10964. Further support was provided by the EU FP7 project digital.me, funded by the EC (FP7/2007–2013) under grant no. 257787 as well as the Spanish CDTI research project CENIT-2008-1019, the CICYT TIN2011-27767-C02-01 project and the regional projects with reference PPII10-0300-4172 and PIIC09-0185-1030.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag London
About this chapter
Cite this chapter
Heupel, M., Bourimi, M., Schwarte, P., Kesdogan, D., Barth, T., Villanueva, P.G. (2013). Enhancing the Security and Usability of Dui Based Collaboration with Proof Based Access Control. In: Lozano, M., Gallud, J., Tesoriero, R., Penichet, V. (eds) Distributed User Interfaces: Usability and Collaboration. Human–Computer Interaction Series. Springer, London. https://doi.org/10.1007/978-1-4471-5499-0_8
Download citation
DOI: https://doi.org/10.1007/978-1-4471-5499-0_8
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-5498-3
Online ISBN: 978-1-4471-5499-0
eBook Packages: Computer ScienceComputer Science (R0)