skip to main content
10.1145/1978942.1979243acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

More than skin deep: measuring effects of the underlying model on access-control system usability

Published: 07 May 2011 Publication History

Abstract

In access-control systems, policy rules conflict when they prescribe different decisions (allow or deny) for the same access. We present the results of a user study that demonstrates the significant impact of conflict-resolution method on policy-authoring usability. In our study of 54 participants, varying the conflict-resolution method yielded statistically significant differences in accuracy in five of the six tasks we tested, including differences in accuracy rates of up to 78%. Our results suggest that a conflict-resolution method favoring rules of smaller scope over rules of larger scope is more usable than the Microsoft Windows operating system's method of favoring deny rules over allow rules. Perhaps more importantly, our results demonstrate that even seemingly small changes to a system's semantics can fundamentally affect the system's usability in ways that are beyond the power of user interfaces to correct.

References

[1]
A. Adams and M. A. Sasse. Users are not the enemy. Communications of the ACM, 42(12):41--46, December 1999.
[2]
L. Bauer, L. F. Cranor, R. W. Reeder, M. K. Reiter, and K. Vaniea. A user study of policy creation in a flexible access-control system. ACM SIGCHI Conference on Human Factors in Computing Systems, pages 543--552, April 2008.
[3]
S. Brostoff, M. A. Sasse, D. Chadwick, J. Cunningham, U. Mbanaso, and S. Otenko. 'R-What?' Development of a role-based access control policy-writing tool for e-Scientists. Software Practice & Experience, 35(9):835--856, June 2005.
[4]
X. Cao and L. Iverson. Intentional access management: Making access control usable for end-users. 2nd Symposium on Usable Privacy and Security, pages 20--31, 2006.
[5]
D. J. Dougherty, K. Fisler, and S. Krishnamurthi. Specifying and reasoning about dynamic access-control policies. 3rd International Joint Conference on Automated Reasoning, Lecture Notes in Computer Science, Vol. 4130, pages 632--646, August 2006.
[6]
K. Fisler and S. Krishnamurthi. A model of triangulating environments for policy authoring. 15th ACM Symp. on Access Control Models and Technologies, p. 3--12, June 2010.
[7]
I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer. A secure environment for untrusted helper applications: Confining the wily hacker. 6th USENIX Security Symposium, July 1996.
[8]
N. S. Good and A. Krekelberg. Usability and privacy: a study of Kazaa P2P file-sharing. ACM SIGCHI Conf. on Human Factors in Computing Systems, pages 137--144, April 2003.
[9]
P. Inglesant, M. A. Sasse, D. Chadwick, and L. L. Shi. Expressions of expertness: The virtuous circle of natural language for access control policy specification. 2008 Symposium on Usable Privacy and Security, July 2008.
[10]
S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino. A unified framework for enforcing multiple access control policies. 1997 ACM SIGMOD International Conference on Management of Data, pages 474--485, 1997.
[11]
M. Johnson, S. M. Bellovin, R. W. Reeder, and S. E. Schechter. Laissez-faire file sharing: Access control designed for individuals at the endpoints. 2009 New Security Paradigms Workshop, pages 1--10, 2009.
[12]
A. Kapadia, G. Sampemane, and R. H. Campbell. KNOW why your access was denied: Regulating feedback for usable security. 11th ACM Conference on Computer and Communications Security, pages 52--61, 2004.
[13]
C.-M. Karat, C. Brodie, and J. Karat. Usability design and evaluation for privacy and security solutions. In L. F. Cranor and S. Garfinkel, editors, Security and Usability, chapter 4, pages 47--74. O'Reilly, Sebastopol, CA, 2005.
[14]
C.-M. Karat, J. Karat, C. Brodie, and J. Feng. Evaluating interfaces for privacy policy rule authoring. ACM SIGCHI Conference on Human Factors in Computing Systems, pages 83--92, 2006.
[15]
B. W. Lampson. Protection. Operating Systems Review, 8(1):18--24, January 1974.
[16]
R. A. Maxion and R. W. Reeder. Improving user-interface dependability through mitigation of human error. International Journal of Human-Computer Studies, 63(1--2):25--50, July 2005.
[17]
R. W. Reeder. Expandable Grids: A user interface visualization technique and a policy semantics to support fast, accurate security and privacy policy authoring. PhD thesis, Computer Science Department, Carnegie Mellon University, Pittsburgh, PA, May 2008. Available as technical report number Carnegie Mellon University-CS-08--143.
[18]
R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter, K. Bacon, K. How, and H. Strong. Expandable grids for visualizing and authoring computer security policies. ACM SIGCHI Conference on Human Factors in Computing Systems, pages 1473--1482, April 2008.
[19]
J. Rode, C. Johansson, P. DiGioia, R. S. Filho, K. Nies, D. H. Nguyen, J. Ren, P. Dourish, and D. Redmiles. Seeing further: Extending visualization as a basis for usable security. 2nd Symp. on Usable Privacy and Security, pages 145--155, 2006.
[20]
B. Shneiderman. Direct manipulation: A step beyond programming languages. Computer, 16(8):57--69, August 1983.
[21]
U.S. Senate Sergeant at Arms. Report on the investigation into improper access to the Senate Judiciary Committee's computer system. Available at http://judiciary.senate.gov/testimony.cfm?id=1085&wit_id=2514, March 2004.
[22]
T. Whalen, D. Smetters, and E. F. Churchill. User experiences with sharing and access control. Conference on Human Factors in Computing Systems Extended Abstracts, pages 1517--1522, April 2006.
[23]
M. E. Zurko, R. Simon, and T. Sanfilippo. A user-centered, modular authorization service built on an RBAC foundation. 1999 IEEE Symposium on Security and Privacy, pages 57--71, May 1999.
[24]
M. E. Zurko and R. T. Simon. User-centered security. Workshop on New Security Paradigms, pages 27--33, Lake Arrowhead, CA, September 1996. Available at http://www.memesoft.com/adage/.

Cited By

View all
  • (2024)Exploring expandable-grid designs to make iOS app privacy labels more usableProceedings of the Twentieth USENIX Conference on Usable Privacy and Security10.5555/3696899.3696907(139-157)Online publication date: 12-Aug-2024
  • (2024)Cognition Behind Access Control: A Usability Comparison of Rule- and Category-Based MechanismsICT Systems Security and Privacy Protection10.1007/978-3-031-65175-5_26(367-380)Online publication date: 26-Jul-2024
  • (2023)Optimistic Access Control for the Smart Home2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179475(3043-3060)Online publication date: May-2023
  • Show More Cited By

Index Terms

  1. More than skin deep: measuring effects of the underlying model on access-control system usability
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          CHI '11: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
          May 2011
          3530 pages
          ISBN:9781450302289
          DOI:10.1145/1978942
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Sponsors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 07 May 2011

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. access control
          2. home computing
          3. human factors
          4. privacy
          5. security

          Qualifiers

          • Research-article

          Conference

          CHI '11
          Sponsor:

          Acceptance Rates

          CHI '11 Paper Acceptance Rate 410 of 1,532 submissions, 27%;
          Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

          Upcoming Conference

          CHI 2025
          ACM CHI Conference on Human Factors in Computing Systems
          April 26 - May 1, 2025
          Yokohama , Japan

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)18
          • Downloads (Last 6 weeks)1
          Reflects downloads up to 08 Mar 2025

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Exploring expandable-grid designs to make iOS app privacy labels more usableProceedings of the Twentieth USENIX Conference on Usable Privacy and Security10.5555/3696899.3696907(139-157)Online publication date: 12-Aug-2024
          • (2024)Cognition Behind Access Control: A Usability Comparison of Rule- and Category-Based MechanismsICT Systems Security and Privacy Protection10.1007/978-3-031-65175-5_26(367-380)Online publication date: 26-Jul-2024
          • (2023)Optimistic Access Control for the Smart Home2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179475(3043-3060)Online publication date: May-2023
          • (2022)Supporting users in data disclosure scenarios in agriculture through transparencyBehaviour & Information Technology10.1080/0144929X.2022.206807041:10(2151-2173)Online publication date: 10-May-2022
          • (2022)Granularity and Usability in Authorization PoliciesEmerging Information Security and Applications10.1007/978-3-030-93956-4_5(68-86)Online publication date: 12-Jan-2022
          • (2021)Tensions between Access and Control in MakerspacesProceedings of the ACM on Human-Computer Interaction10.1145/34329144:CSCW3(1-33)Online publication date: 5-Jan-2021
          • (2017)How Do System Administrators Resolve Access-Denied Issues in the Real World?Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems10.1145/3025453.3025999(348-361)Online publication date: 2-May-2017
          • (2016)"Popcorn Tastes Good"Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems10.1145/2858036.2858516(1126-1137)Online publication date: 7-May-2016
          • (2015)Context-Based Access Control Systems for Mobile DevicesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2014.232073112:2(150-163)Online publication date: 10-Mar-2015
          • (2014)To authorize or not authorizeProceedings of the Tenth USENIX Conference on Usable Privacy and Security10.5555/3235838.3235865(301-320)Online publication date: 9-Jul-2014
          • Show More Cited By

          View Options

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Figures

          Tables

          Media

          Share

          Share

          Share this Publication link

          Share on social media