homeresources & publications › how users use access control

TECHNICAL PUBLICATIONS:

How users use access control

 

Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requires more user effort. We would like to understand what level of control users need over their data, by examining what sorts of policies users actually apply to their shared data in practice. We used automated data mining techniques to examine the real-world use of access control features present in standard document sharing systems in a corporate environment over a long (> 10 year) time span.

 
 
read more
 
citation

Smetters, D. K.; Good, N. How users use access control. Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS 2009); Mountain View, CA, 2009 July 15-17. NY: ACM; 2009, 1-12.

copyright

Copyright © ACM, 2009. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in SOUPS 2009 http://doi.acm.org/10.1145/1572532.1572552