Usable Access Control
The research described in this work can significantly simplify and facilitate the creation and configuration of secure access control rule sets. Access control is used to provide confidential data or information only to authorized entities and deny access otherwise. Access control mechanisms can...
Main Author: | |
---|---|
Format: | Others |
Language: | German en |
Published: |
2014
|
Online Access: | https://tuprints.ulb.tu-darmstadt.de/3828/1/Diss86.pdf Beckerle, Matthias <http://tuprints.ulb.tu-darmstadt.de/view/person/Beckerle=3AMatthias=3A=3A.html> (2014): Usable Access Control.Darmstadt, Technische Universität, [Ph.D. Thesis] |
id |
ndltd-tu-darmstadt.de-oai-tuprints.ulb.tu-darmstadt.de-3828 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-tu-darmstadt.de-oai-tuprints.ulb.tu-darmstadt.de-38282020-07-15T07:09:31Z http://tuprints.ulb.tu-darmstadt.de/3828/ Usable Access Control Beckerle, Matthias The research described in this work can significantly simplify and facilitate the creation and configuration of secure access control rule sets. Access control is used to provide confidential data or information only to authorized entities and deny access otherwise. Access control mechanisms can be configured with access control rule sets that need to be created and maintained by the users or administrators. The research commences by answering the first research question: 1. How can access control be integrated into future products? Basic concepts are presented and integrated into a holistic design. The latter is embedded into a general framework, which was developed by an academia-industry consortium, and in which the author participated. Questions arise regarding usability aspects of access control mechanisms. An analysis of security services in the beginning of this dissertation shows that, especially for access control mechanisms that are managed by casual users, a high level of usability is required because individual preferences of the data owner have to be taken into account. Analysis of how the core security objectives (see Section [sec:Core-Security-Principles]) can be achieved identifies a usability gap regarding the generation and configuration of access control rule sets. Automation is not fully possible because individual preferences of users need to be considered. Related research questions are: 2. What are the requirements for usable access control rule sets? 3. What are formally founded quantifiable measurements for those requirements, and how can these measurements be used to support users in generating of usable access control rule sets? To answer these questions, a systematic analysis of expert opinions and related work was performed. The results of that analysis were grouped into categories and further refined into six informal requirements. The six informal requirements were mathematically formalized and six associated sets with respective linear metrics were derived. These formal tools are used to automatically calculate additional information about the actual access control rule set to support users in generating and optimizing the rule set properly. Two user studies were carried out to validate and evaluate the research and the findings presented in this work. They demonstrate that our metrics help users generate statistically significant better rule sets. The dissertation concludes with an outlook and a vision for further research in usable access control rule set configuration. 2014 Ph.D. Thesis NonPeerReviewed text ger CC-BY-NC-ND 2.5 de - Creative Commons, Attribution Non-commerical, No-derivatives https://tuprints.ulb.tu-darmstadt.de/3828/1/Diss86.pdf Beckerle, Matthias <http://tuprints.ulb.tu-darmstadt.de/view/person/Beckerle=3AMatthias=3A=3A.html> (2014): Usable Access Control.Darmstadt, Technische Universität, [Ph.D. Thesis] en info:eu-repo/semantics/doctoralThesis info:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
German en |
format |
Others
|
sources |
NDLTD |
description |
The research described in this work can significantly simplify and facilitate the creation and configuration of secure access control rule sets.
Access control is used to provide confidential data or information only to authorized entities and deny access otherwise. Access control mechanisms can be configured with access control rule sets that need to be created and maintained by the users or administrators.
The research commences by answering the first research question:
1. How can access control be integrated into future products?
Basic concepts are presented and integrated into a holistic design. The latter is embedded into a general framework, which was developed by an academia-industry consortium, and in which the author participated.
Questions arise regarding usability aspects of access control mechanisms. An analysis of security services in the beginning of this dissertation shows that, especially for access control mechanisms that are managed by casual users, a high level of usability is required because individual preferences of the data owner have to be taken into account.
Analysis of how the core security objectives (see Section [sec:Core-Security-Principles]) can be achieved identifies a usability gap regarding the generation and configuration of access control rule sets. Automation is not fully possible because individual preferences of users need to be considered.
Related research questions are:
2. What are the requirements for usable access control rule sets?
3. What are formally founded quantifiable measurements for those requirements, and how can these measurements be used to support users in generating of usable access control rule sets?
To answer these questions, a systematic analysis of expert opinions and related work was performed. The results of that analysis were grouped into categories and further refined into six informal requirements. The six informal requirements were mathematically formalized and six associated sets with respective linear metrics were derived. These formal tools are used to automatically calculate additional information about the actual access control rule set to support users in generating and optimizing the rule set properly. Two user studies were carried out to validate and evaluate the research and the findings presented in this work. They demonstrate that our metrics help users generate statistically significant better rule sets.
The dissertation concludes with an outlook and a vision for further research in usable access control rule set configuration. |
author |
Beckerle, Matthias |
spellingShingle |
Beckerle, Matthias Usable Access Control |
author_facet |
Beckerle, Matthias |
author_sort |
Beckerle, Matthias |
title |
Usable Access Control |
title_short |
Usable Access Control |
title_full |
Usable Access Control |
title_fullStr |
Usable Access Control |
title_full_unstemmed |
Usable Access Control |
title_sort |
usable access control |
publishDate |
2014 |
url |
https://tuprints.ulb.tu-darmstadt.de/3828/1/Diss86.pdf Beckerle, Matthias <http://tuprints.ulb.tu-darmstadt.de/view/person/Beckerle=3AMatthias=3A=3A.html> (2014): Usable Access Control.Darmstadt, Technische Universität, [Ph.D. Thesis] |
work_keys_str_mv |
AT beckerlematthias usableaccesscontrol |
_version_ |
1719327070386913280 |