NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
A study of preferences for sharing and privacy
CHI '05 Extended Abstracts on Human Factors in Computing Systems
Distributed Proving in Access-Control Systems
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Improving user-interface dependability through mitigation of human error
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Share and share alike: exploring the user interface affordances of file sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A grounded theory of information sharing behavior in a personal learning space
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
Homeviews: peer-to-peer middleware for personal data sharing applications
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
A user study of policy creation in a flexible access-control system
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
It's on my other computer!: computing with multiple devices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Family accounts: a new paradigm for user accounts within the home environment
Proceedings of the 2008 ACM conference on Computer supported cooperative work
Computer help at home: methods and motivations for informal technical support
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Can i borrow your phone?: understanding concerns when sharing mobile phones
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Perspective: semantic data management for the home
FAST '09 Proccedings of the 7th conference on File and storage technologies
Ubiquitous systems and the family: thoughts about the networked home
Proceedings of the 5th Symposium on Usable Privacy and Security
Yours, mine and ours? sharing and use of technology in domestic environments
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
The home needs an operating system (and an app store)
Hotnets-IX Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks
Design and implementation of user-managed access framework for web 2.0 applications
Proceedings of the 5th International Workshop on Middleware for Service Oriented Computing
Challenges in access right assignment for secure home networks
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
Exploring reactive access control
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Home automation in the wild: challenges and opportunities
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
Policy expressivity in the Anzere personal cloud
Proceedings of the 2nd ACM Symposium on Cloud Computing
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs
Personal and Ubiquitous Computing
Proceedings of the 50th Annual Southeast Regional Conference
Tag, you can see it!: using tags for access control in photo sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ZZFS: a hybrid device and cloud file system for spontaneous users
FAST'12 Proceedings of the 10th USENIX conference on File and Storage Technologies
An operating system for the home
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Don't trust your roommate or access control and replication protocols in "Home" environments
HotStorage'12 Proceedings of the 4th USENIX conference on Hot Topics in Storage and File Systems
Distinguishing users with capacitive touch communication
Proceedings of the 18th annual international conference on Mobile computing and networking
HomeLab: shared infrastructure for home technology field studies
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Computer security and the modern home
Communications of the ACM
Managing access control for things: a capability based approach
Proceedings of the 7th International Conference on Body Area Networks
Why do people seek anonymity on the internet?: informing policy and design
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Formal definitions for usable access control rule sets from goals to metrics
Proceedings of the Ninth Symposium on Usable Privacy and Security
An empirical study of three access control systems
Proceedings of the 6th International Conference on Security of Information and Networks
Toward strong, usable access control for shared distributed data
FAST'14 Proceedings of the 12th USENIX conference on File and Storage Technologies
Hi-index | 0.02 |
As digital content becomes more prevalent in the home, non-technical users are increasingly interested in sharing that content with others and accessing it from multiple devices. Not much is known about how these users think about controlling access to this data. To better understand this, we conducted semi-structured, in-situ interviews with 33 users in 15 households. We found that users create ad-hoc access-control mechanisms that do not always work; that their ideal policies are complex and multi-dimensional; that a priori policy specification is often insufficient; and that people's mental models of access control and security are often misaligned with current systems. We detail these findings and present a set of associated guidelines for designing usable access-control systems for the home environment.