How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requires more user effort. We would like to understand what level of control users need over their data, by examining what sorts of policies users actually apply to their shared data in practice. We used automated data mining techniques to examine the real-world use of access control features present in standard document sharing systems in a corporate environment over a long (> 10 year) time span.
- download PDF (327K)
Smetters, D. K.; Good, N. How users use access control. Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS 2009); Mountain View, CA, 2009 July 15-17. NY: ACM; 2009, 1-12.
Copyright © ACM, 2009. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in SOUPS 2009 http://doi.acm.org/10.1145/1572532.1572552