Significant effort has been invested in developing expressive and flexible access-control languages and systems. How-ever, little has been done to evaluate these systems in prac-tical situations with real users, and few attempts have been made to discover and analyze the access-control policies that users actually want to implement. We report on a user study in which we derive the ideal access policies desired by a group of users for physical security in an office environment. We compare these ideal policies to the policies the users ac-tually implemented with keys and with a smartphone-based distributed access-control system. We develop a methodol-ogy that allows us to show quantitatively that the smartphone system allowed our users to imp...
The security policies of mobile devices that describe how we should use these devices are often inf...
Managing access control policies can be a daunting process, given the frequent policy decisions that...
The increased pervasiveness of wireless mobile computing devices draws new attention to the need for...
Significant effort has been invested in developing expressive and flexible access-control languages ...
Significant effort has been invested in developing expressive and flexible access-control languages ...
Significant effort has been invested in developing expressive and flexible access-control languages ...
Many protection mechanisms in computer security are designed to enforce a configurable policy. The s...
Applications are continuously increasing in both complexity and number of users they serve. Moreover...
Many smartphone operating systems implement strong sandboxing for 3rd party application software. As...
The research described in this work can significantly simplify and facilitate the creation and confi...
International audienceThe novel scenarios enabled by emerging mobile social applications raise serio...
The use of smartphones and tablet devices has grown rapidly over recent years and the widespread ava...
With sensitive information about ourselves now distributed across personal devices, people need to m...
Abstract — Modern client platforms, such as iOS, Android, Windows Phone, Windows 8, and web browsers...
Grey is a smartphone-based system by which a user can exercise her authority to gain access to rooms...
The security policies of mobile devices that describe how we should use these devices are often inf...
Managing access control policies can be a daunting process, given the frequent policy decisions that...
The increased pervasiveness of wireless mobile computing devices draws new attention to the need for...
Significant effort has been invested in developing expressive and flexible access-control languages ...
Significant effort has been invested in developing expressive and flexible access-control languages ...
Significant effort has been invested in developing expressive and flexible access-control languages ...
Many protection mechanisms in computer security are designed to enforce a configurable policy. The s...
Applications are continuously increasing in both complexity and number of users they serve. Moreover...
Many smartphone operating systems implement strong sandboxing for 3rd party application software. As...
The research described in this work can significantly simplify and facilitate the creation and confi...
International audienceThe novel scenarios enabled by emerging mobile social applications raise serio...
The use of smartphones and tablet devices has grown rapidly over recent years and the widespread ava...
With sensitive information about ourselves now distributed across personal devices, people need to m...
Abstract — Modern client platforms, such as iOS, Android, Windows Phone, Windows 8, and web browsers...
Grey is a smartphone-based system by which a user can exercise her authority to gain access to rooms...
The security policies of mobile devices that describe how we should use these devices are often inf...
Managing access control policies can be a daunting process, given the frequent policy decisions that...
The increased pervasiveness of wireless mobile computing devices draws new attention to the need for...