Role-Based Access Control Models
Computer
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Generalized Role-Based Access Control
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
Privacy and security: Usable security: how to get it
Communications of the ACM - Scratch Programming for All
Enhancing research into usable privacy and security
Proceedings of the 27th ACM international conference on Design of communication
Feasibility of structural network clustering for group-based privacy control in social networks
Proceedings of the Sixth Symposium on Usable Privacy and Security
Guest Editors' Introduction: Shouldn't All Security Be Usable?
IEEE Security and Privacy
More than skin deep: measuring effects of the underlying model on access-control system usability
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Oops, I did it again: mitigating repeated access control errors on facebook
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Policy-by-example for online social networks
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Hi-index | 0.00 |
Online social networks have seen tremendous adoption and growth in recent years. Most attention, in access control literature, has been placed on abstracting and managing the large numbers of subjects or friends within these online social networks. Usable approaches for managing large amounts of objects, in the form of privacy information and content, have lagged. We introduce two approaches for object management. We extend our previous work to accommodate for object grouping and we introduce Same-As Object Management, which provides for a more usable object management approach that is effective, efficient and satisfying to the user. Same-As Object Management leverages a user's memory and perception of their objects for setting permissions for other similar objects. We implemented our model in an online social network and conducted a user study whose results are encouraging.