SOSP '91 Proceedings of the thirteenth ACM symposium on Operating systems principles
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Authentication in the Taos operating system
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Usability Engineering
A General and Flexible Access-Control System for the Web
Proceedings of the 11th USENIX Security Symposium
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
User-Centered Web Site Development: A Human-Computer Interaction Approach
User-Centered Web Site Development: A Human-Computer Interaction Approach
A study of preferences for sharing and privacy
CHI '05 Extended Abstracts on Human Factors in Computing Systems
Distributed Proving in Access-Control Systems
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
A grounded theory of information sharing behavior in a personal learning space
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Homeviews: peer-to-peer middleware for personal data sharing applications
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
EnsemBlue: integrating distributed storage and consumer electronics
OSDI '06 Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation - Volume 7
Alpaca: extensible authorization for distributed services
Proceedings of the 14th ACM conference on Computer and communications security
Universal Access in the Information Society
Expandable grids for visualizing and authoring computer security policies
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A content-driven access control system
Proceedings of the 7th symposium on Identity and trust on the Internet
CSF '08 Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium
The intellectual challenge of CSCW: the gap between social requirements and technical feasibility
Human-Computer Interaction
Can i borrow your phone?: understanding concerns when sharing mobile phones
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Perspective: semantic data management for the home
FAST '09 Proccedings of the 7th conference on File and storage technologies
Cimbiosys: a platform for content-based partial replication
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Ubiquitous systems and the family: thoughts about the networked home
Proceedings of the 5th Symposium on Usable Privacy and Security
Proceedings of the 5th Symposium on Usable Privacy and Security
Usable Privacy Controls for Blogs
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 04
Easy on that trigger dad: a study of long term family photo retrieval
Personal and Ubiquitous Computing
The infrastructure problem in HCI
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Access Control for Home Data Sharing: Attitudes, Needs and Practices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Moving beyond untagging: photo privacy in a tagged world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Policy-based access control for weakly consistent replication
Proceedings of the 5th European conference on Computer systems
Yours, mine and ours? sharing and use of technology in domestic environments
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
Hierarchical file systems are dead
HotOS'09 Proceedings of the 12th conference on Hot topics in operating systems
PodBase: transparent storage management for personal devices
IPTPS'08 Proceedings of the 7th international conference on Peer-to-peer systems
Usable Policy Template Authoring for Iterative Policy Refinement
POLICY '10 Proceedings of the 2010 IEEE International Symposium on Policies for Distributed Systems and Networks
Exploring reactive access control
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Eyo: device-transparent personal storage
USENIXATC'11 Proceedings of the 2011 USENIX conference on USENIX annual technical conference
Policy expressivity in the Anzere personal cloud
Proceedings of the 2nd ACM Symposium on Cloud Computing
Tag, you can see it!: using tags for access control in photo sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Fighting for my space: coping mechanisms for sns boundary regulation
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Income, race, and class: exploring socioeconomic differences in family technology use
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Hummingbird: Privacy at the Time of Twitter
SP '12 Proceedings of the 2012 IEEE Symposium on Security and Privacy
Facebook and privacy: it's complicated
Proceedings of the Eighth Symposium on Usable Privacy and Security
PST '12 Proceedings of the 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST)
Efficient proving for practical distributed access-control systems
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Privacy settings in social networking systems: what you cannot control
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Retrospective privacy: managing longitudinal privacy in online social networks
Proceedings of the Ninth Symposium on Usable Privacy and Security
Hi-index | 0.00 |
As non-expert users produce increasing amounts of personal digital data, usable access control becomes critical. Current approaches often fail, because they insufficiently protect data or confuse users about policy specification. This paper presents Penumbra, a distributed file system with access control designed to match users' mental models while providing principled security. Penumbra's design combines semantic, tag-based policy specification with logic-based access control, flexibly supporting intuitive policies while providing high assurance of correctness. It supports private tags, tag disagreement between users, decentralized policy enforcement, and unforgeable audit records. Penumbra's logic can express a variety of policies that map well to real users' needs. To evaluate Penumbra's design, we develop a set of detailed, realistic case studies drawn from prior research into users' access-control preferences. Using microbenchmarks and traces generated from the case studies, we demonstrate that Penumbra can enforce users' policies with overhead less than 5% for most system calls.