skip to main content
10.1145/2523514.2523550acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

An empirical study of three access control systems

Authors Info & Claims
Published:26 November 2013Publication History

ABSTRACT

Access control systems are a key component of computer system security. This paper presents the results of an effort to understand the usability of current access control systems. A study was conducted to observe users of three access control systems: UNIX discretionary access control (DAC), SELinux, and a novel access control system, a File System Firewall (FSF), which we have designed and implemented. Several recommendations for improving user experiences with access control systems are presented based on our analysis of the study results.

References

  1. Ross J. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition. Wiley. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Konstantin Beznosov, Philip Inglesant, Jorge Lobo, Rob Reeder, and Mary Ellen Zurko. 2009. Usability Meets Access Control: Challenges and Research Opportunities, In Proceeding of SACMAT '09 Proceedings of the 14th ACM symposium on Access control models and technologies (Stresa, Italy, June 3--5, 2009). SACMAT'09. ACM, New York, NY, 73--74. DOI=http://dl.acm.org/10.1145/1542207.1542220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Alma Whitten. 2004. Making Security Usable, Doctoral thesis. CMU-CS-04-135. Carnegie Mellon University.Google ScholarGoogle Scholar
  4. Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin and David Wagner. 2012. Android Permissions: User Attention, Comprehension, and Behavior. In Proceeding of the Eighth Symposium on Usable Privacy and Security (Washington, DC, July 11--13, 2012). SOUPS '12. ACM, New York, NY, Article No. 3. DOI=http://doi.acm.org/10.1145/2335356.2335360. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. D. K. Smetters and N. Good. 2009. How Users Use Access Control. In Proceedings of the 5th Symposium on Usable Privacy and Security (Mountain View, CA, July 15--17, 2009). SOUPS '09. ACM, New York, NY, 1--12. DOI=http://doi.acm.org/10.1145/1572532.1572552. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Sara Motiee, Kirstie Hawkey, and Konstantin Beznosov. 2010. Do Windows Users Follow the Principle of Least Privilege? Investigating User Account Control Practices. In Proceedings of the Sixth Symposium on Usable Privacy and Security (Redmond, WA, July 14--16, 2010). SOUPS '10. ACM, New York, NY, 1--13. DOI=http://doi.acm.org/10.1145/1837110.1837112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Xiang Cao and Lee Iverson. 2006. Intentional Access Management: Making Access Control Usable for End-Users. In Proceedings of the second Symposium on Usable Privacy and Security (Pittsburgh, PA, July 12--14, 2006). SOUPS '06. ACM, New York, NY, 20--31. DOI=http://doi.acm.org/10.1145/1143120.1143124. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Michelle L. Mazurek, J. P. Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion, Christina Johns, Daniel Lee, Yuan Liang, Jenny Olsen, Brandon Salmon, Richard Shay, Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Gregory R. Ganger, and Michael K. Reiter. 2010. Access Control for Home Data Sharing: Attitudes, Needs and Practices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Atlanta, GA, April 10--15, 2010). CHI '10, ACM, New York, NY, 645--654. DOI=http://doi.acm.org/10.1145/1753326.1753421. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Z. Cliffe Schreuders, Tanya McGill, and Christian Payne. 2011. Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor, and FBAC-LSM. ACM Transactions on Information and System Security (TISSEC). v. 14 n. 2, 1--28, September 2011. DOI=http://doi.acm.org/10.1145/2019599.2019604. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An empirical study of three access control systems

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
            November 2013
            483 pages
            ISBN:9781450324984
            DOI:10.1145/2523514

            Copyright © 2013 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 26 November 2013

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • short-paper

            Acceptance Rates

            Overall Acceptance Rate102of289submissions,35%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader