How users use access control

  • Authors:
  • D. K. Smetters;Nathan Good

  • Affiliations:
  • PARC, Palo Alto, CA;PARC, Palo Alto, CA

  • Venue:
  • Proceedings of the 5th Symposium on Usable Privacy and Security
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requires more user effort. We want to understand what level of control users need over their data, by examining what sorts of access policies users actually create in practice. We used automated data mining techniques to examine the real-world use of access control features present in standard document sharing systems in a corporate environment as used over a long ( 10 year) time span. We find that while users rarely need to change access policies, the policies they do express are actually quite complex. We also find that users participate in larger numbers of access control and email sharing groups than measured by self-report in previous studies. We hypothesize that much of this complexity might be reduced by considering these policies as examples of simpler access control patterns. From our analysis of what access control features are used and where errors are made, we propose a set of design guidelines for access control systems themselves and the tools used to manage them, intended to increase usability and decrease error.