Sciweavers

Share
SOUPS
2009
ACM

How users use access control

12 years 8 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requires more user effort. We want to understand what level of control users need over their data, by examining what sorts of access policies users actually create in practice. We used automated data mining techniques to examine the realworld use of access control features present in standard document sharing systems in a corporate environment as used over a long (> 10 year) time span. We find that while users rarely need to change access policies, the policies they do express are actually quite complex. We also find that users participate in larger numbers of access control and email sharing groups than measured by self-report in previous studies. We hypothesize that much of this complexity might be reduced by considering these policies as examples of simpler access control patterns. From our analysis of wh...
Diana K. Smetters, Nathan Good
Added 28 May 2010
Updated 28 May 2010
Type Conference
Year 2009
Where SOUPS
Authors Diana K. Smetters, Nathan Good
Comments (0)
books