Significant effort has been invested in developing expressive and flexible access-control languages and systems. However, little work has been done to evaluate these theoretically interesting systems in practical situations with real users, and few attempts have been made to discover and analyze the accesscontrol policies that users actually want to implement. In this paper we report on a study in which we derive the ideal access policies desired by a group of users for physical security in an office environment. We compare these ideal policies to the policies the users actually implemented with keys and with Grey, a smartphone-based distributed access-control system. We show quantitatively that Grey allowed our users to implement their ide...
The incumbent physical security system on smartphones is known to dissatisfy users. It comprises exp...
The use of smartphones and tablet devices has grown rapidly over recent years and the widespread ava...
Access control is the process of mediating every request to data and services maintained by a system...
Significant effort has been invested in developing expressive and flexible access-control languages ...
Significant effort has been invested in developing expressive and flexible access-control languages ...
Significant effort has been invested in developing expressive and flexible access-control languages ...
Grey is a smartphone-based system by which a user can exercise her authority to gain access to rooms...
Grey is a smartphone-based system by which a user can exerci-se her authority to gain access to room...
Many smartphone operating systems implement strong sandboxing for 3rd party application software. As...
The research described in this work can significantly simplify and facilitate the creation and confi...
A growing trend exerted by current users in accessing sensitive data and performing critical data ex...
To regulate and control the access of private areas, companies have developed and deployed several t...
Abstract — Modern client platforms, such as iOS, Android, Windows Phone, Windows 8, and web browsers...
Applications are continuously increasing in both complexity and number of users they serve. Moreover...
We describe the design and implementation of Grey, a set of software extensions that convert an off-...
The incumbent physical security system on smartphones is known to dissatisfy users. It comprises exp...
The use of smartphones and tablet devices has grown rapidly over recent years and the widespread ava...
Access control is the process of mediating every request to data and services maintained by a system...
Significant effort has been invested in developing expressive and flexible access-control languages ...
Significant effort has been invested in developing expressive and flexible access-control languages ...
Significant effort has been invested in developing expressive and flexible access-control languages ...
Grey is a smartphone-based system by which a user can exercise her authority to gain access to rooms...
Grey is a smartphone-based system by which a user can exerci-se her authority to gain access to room...
Many smartphone operating systems implement strong sandboxing for 3rd party application software. As...
The research described in this work can significantly simplify and facilitate the creation and confi...
A growing trend exerted by current users in accessing sensitive data and performing critical data ex...
To regulate and control the access of private areas, companies have developed and deployed several t...
Abstract — Modern client platforms, such as iOS, Android, Windows Phone, Windows 8, and web browsers...
Applications are continuously increasing in both complexity and number of users they serve. Moreover...
We describe the design and implementation of Grey, a set of software extensions that convert an off-...
The incumbent physical security system on smartphones is known to dissatisfy users. It comprises exp...
The use of smartphones and tablet devices has grown rapidly over recent years and the widespread ava...
Access control is the process of mediating every request to data and services maintained by a system...