Skip to main content

Usability of Security Management:Defining the Permissions of Guests

  • Conference paper
Security Protocols (Security Protocols 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5087))

Included in the following conference series:

  • 604 Accesses

Abstract

Within the scenario of a Smart Home, we discuss the issues involved in allowing limited interaction with the environment for unidentified principals, or guests. The challenges include identifying and authenticating guests on one hand and delegating authorization to them on the other. While the technical mechanisms for doing so in generic distributed systems have been around for decades, existing solutions are in general not applicable to the smart home because they are too complex to manage. We focus on providing both security and usability; we therefore seek simple and easy to understand approaches that can be used by a normal computer-illiterate home owner, not just by a trained system administrator. This position paper describes ongoing research and does not claim to have all the answers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Kidd, C.D., Orr, R., Abowd, G.D., Atkeson, C.G., Essa, I.A., MacIntyre, B., Mynatt, E.D., Starner, T., Newstetter, W.: The aware home: A living laboratory for ubiquitous computing research. In: Streitz, N.A., Hartkopf, V. (eds.) CoBuild 1999. LNCS, vol. 1670, pp. 191–198. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  2. Cooperstock, J.R., Tanikoshi, K., Beirne, G., Narine, T., Buxton, W.: Evolution of a reactive environment. In: Proc. of CHI 1995, Denver, CO, pp. 170–177 (1995)

    Google Scholar 

  3. Weatherall, J., Jones, A.: Ubiquitous networks and their applications. IEEE Wireless Communications 9, 18–19 (2002)

    Article  Google Scholar 

  4. Sellen, A., Eardley, R., Izadi, S., Harper, R.: The whereabouts clock: early testing of a situated awareness device. In: CHI 2006: CHI 2006 extended abstracts on Human factors in computing systems, pp. 1307–1312. ACM Press, New York (2006)

    Chapter  Google Scholar 

  5. Harper, R. (ed.): Inside the Smart Home. Springer, Heidelberg (2003)

    Google Scholar 

  6. IEEE 802.15 WPAN Task Group 4: ANSI/IEEE 802.15.4-2003, Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Networks. IEEE, New York (2003)

    Google Scholar 

  7. Hightower, J., Borriello, G.: Location systems for ubiquitous computing. IEEE Computer 34(8), 57–66 (2001)

    Google Scholar 

  8. Beresford, A.R.: Location privacy in ubiquitous computing. Technical Report UCAM-CL-TR-612, University of Cambridge, Computer Laboratory (2005)

    Google Scholar 

  9. Harter, A., Hopper, A., Steggles, P., Ward, A., Webster, P.: The anatomy of a context-aware application. In: Mobile Computing and Networking, pp. 59–68 (1999)

    Google Scholar 

  10. Stajano, F.: Security for Ubiquitous Computing. John Wiley and Sons, Chichester (2002)

    Book  Google Scholar 

  11. Wong, F.L., Stajano, F.: Multi-channel protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2005. LNCS, vol. 4631, pp. 112–127. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Johnson, M., Stajano, F. (2009). Usability of Security Management:Defining the Permissions of Guests. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2006. Lecture Notes in Computer Science, vol 5087. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04904-0_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04904-0_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04903-3

  • Online ISBN: 978-3-642-04904-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics