Shamal Faily
Authorisation in context: incorporating context-sensitivity into an access control framework.
Faily, Shamal; Lyle, John; Fl�chais, Ivan; Atzeni, Andrea; Cameroni, Cesare; Myrhaug, Hans; G�ker, Ay?e; Kleinfeld, Robert
Authors
John Lyle
Ivan Fl�chais
Andrea Atzeni
Cesare Cameroni
Hans Myrhaug
Ay?e G�ker
Robert Kleinfeld
Abstract
With sensitive information about ourselves now distributed across personal devices, people need to make access control decisions for different contexts of use. However, despite advances in improving the usability of access control for both developers and users, we still lack insights about how the intentions behind policy decisions in different contexts of use are shaped. In this paper, we describe how context was incorporated into an access control framework using a study of how context influences access control decision making. We describe how the main recommendations arising from this study were used to build context into a policy editor for this access control framework.
Citation
FAILY, S., LYLE, J., FLÉCHAIS, I., ATZENI, A., CAMERONI, C., MYRHAUG, H., GÖKER, A. and KLEINFELD, R. 2014. Authorisation in context: incorporating context-sensitivity into an access control framework. In Proceedings of the 28th International BCS human computer interaction conference (HCI 2014): sand, sea and sky: holiday HCI, 9-12 September 2014, Southport, UK. Swindon: BCS, pages 189-194. Hosted on ScienceOpen [online]. Available from: https://doi.org/10.14236/ewic/hci2014.29
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 28th International BCS human computer interaction conference (HCI 2014): sand, sea and sky: holiday HCI |
Start Date | Sep 9, 2014 |
End Date | Sep 12, 2014 |
Acceptance Date | Sep 9, 2014 |
Online Publication Date | Sep 9, 2014 |
Publication Date | Sep 30, 2014 |
Deposit Date | Dec 2, 2021 |
Publicly Available Date | Dec 2, 2021 |
Publisher | BCS, The Chartered Institute for IT |
Peer Reviewed | Peer Reviewed |
Pages | 189-194 |
Series Title | Electronic workshops in computing |
Series ISSN | 1477-9358 |
DOI | https://doi.org/10.14236/ewic/hci2014.29 |
Keywords | Human-computer interaction (HCI); Systems security; Security risk analysis; Access and authorisation |
Public URL | https://rgu-repository.worktribe.com/output/1446733 |
Additional Information | This paper was based on an earlier presentation with the following citation: FAILY, S., LYLE, J., FLÉCHAIS, I., ATZENI, A., CAMERONI, C., MYRHAUG, H., GÖKER, A. and KLEINFIELD, R. 2013. Policies in context: factors influencing the elicitation and categorisation of context-sensitive security policies. Presented at the Workshop on home usable privacy and security (HUPS), part of the 9th Symposium on usable privacy and security (SOUPS 2013), 24 July 2013, Newcastle, UK. |
Files
FAILY 2014 Authorisation in context
(950 Kb)
PDF
Publisher Licence URL
https://creativecommons.org/licenses/by/4.0/
You might also like
Privacy goals for the data lifecycle.
(2022)
Journal Article
Assessing system of systems information security risk with OASoSIS.
(2022)
Journal Article
Visualising personas as goal models to find security tensions.
(2021)
Journal Article
Evaluating privacy: determining user privacy expectations on the web.
(2021)
Journal Article
DPIA in context: applying DPIA to assess privacy risks of cyber physical systems.
(2020)
Journal Article
Downloadable Citations
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search