Blog
About

151
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework

      , , , , , , ,

      Proceedings of the 28th International BCS Human Computer Interaction Conference (HCI 2014) (HCI)

      BCS Human Computer Interaction Conference (HCI 2014)

      9 - 12 September 2014

      HCI-Security, Access Control, Policy, Affinity Diagram

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          With sensitive information about ourselves now distributed across personal devices, people need to make access control decisions for different contexts of use. However, despite advances in improving the usability of access control for both developers and users, we still lack insights about how the intentions behind policy decisions in different contexts of use are shaped. In this paper, we describe how context was incorporated into an access control framework using a study of how context influences access control decision making. We describe how the main recommendations arising from this study were used to build context into a policy editor for this access control framework.

          Related collections

          Most cited references 8

          • Record: found
          • Abstract: not found
          • Article: not found

          A rational design process: How and why to fake it

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Personal privacy through understanding and action: five pitfalls for designers

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              User-centered security

                Bookmark

                Author and article information

                Contributors
                Conference
                September 2014
                September 2014
                : 189-194
                Affiliations
                Bournemouth University
                University of Oxford
                Politecnico di Torino
                AmbieSense Ltd
                AmbieSense Ltd / City University London
                Fraunhofer FOKUS
                Article
                10.14236/ewic/HCI2014.29
                © Shamal Faily et al. Published by BCS Learning and Development Ltd. Proceedings of the 28th International BCS Human Computer Interaction Conference (HCI 2014), Southport, UK

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                Proceedings of the 28th International BCS Human Computer Interaction Conference (HCI 2014)
                HCI
                28
                Southport, UK
                9 - 12 September 2014
                Electronic Workshops in Computing (eWiC)
                BCS Human Computer Interaction Conference (HCI 2014)
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article