SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Middleware for Secure Home Access and Control
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
A user study of policy creation in a flexible access-control system
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Expandable grids for visualizing and authoring computer security policies
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Can i borrow your phone?: understanding concerns when sharing mobile phones
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Access Control for Home Data Sharing: Attitudes, Needs and Practices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Yours, mine and ours? sharing and use of technology in domestic environments
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Crying wolf: an empirical study of SSL warning effectiveness
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Device-enabled authorization in the grey system
ISC'05 Proceedings of the 8th international conference on Information Security
Home automation in the wild: challenges and opportunities
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Home-network threats and access controls
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Don't trust your roommate or access control and replication protocols in "Home" environments
HotStorage'12 Proceedings of the 4th USENIX conference on Hot Topics in Storage and File Systems
HomeLab: shared infrastructure for home technology field studies
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Computer security and the modern home
Communications of the ACM
Street-Level trust semantics for attribute authentication
SP'12 Proceedings of the 20th international conference on Security Protocols
Hi-index | 0.02 |
The proliferation of advanced technologies has been altering our lifestyle and social interactions - the next frontier is the digital home. Although the future of smart homes is promising, many technical challenges must be addressed to achieve convenience and security. In this paper, we delineate the unique combination of security challenges specifically for access control and consider the challenges of how to simply and securely assign access control policies to visitors for home devices and resources. As an initial approach, we present a set of intuitive access control policies and suggest four access control settings based on our in-person interview results. We anticipate that future research can build on our proposed mechanisms to provide confidence to non-expert home owners for letting visitors use their home network.