1,927
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      Studying business & IT? Drive your professional career forwards with BCS books - for a 20% discount click here: shop.bcs.org

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework

      Published
      proceedings-article
      , , , , , , ,
      Proceedings of the 28th International BCS Human Computer Interaction Conference (HCI 2014) (HCI)
      BCS Human Computer Interaction Conference (HCI 2014)
      9 - 12 September 2014
      HCI-Security, Access Control, Policy, Affinity Diagram
      Bookmark

            Abstract

            With sensitive information about ourselves now distributed across personal devices, people need to make access control decisions for different contexts of use. However, despite advances in improving the usability of access control for both developers and users, we still lack insights about how the intentions behind policy decisions in different contexts of use are shaped. In this paper, we describe how context was incorporated into an access control framework using a study of how context influences access control decision making. We describe how the main recommendations arising from this study were used to build context into a policy editor for this access control framework.

            Content

            Author and article information

            Contributors
            Conference
            September 2014
            September 2014
            : 189-194
            Affiliations
            [0001]Bournemouth University
            [0002]University of Oxford
            [0003]Politecnico di Torino
            [0004]AmbieSense Ltd
            [0005]AmbieSense Ltd / City University London
            [0006]Fraunhofer FOKUS
            Article
            10.14236/ewic/HCI2014.29
            aca7f72b-1ffe-4d98-b0d1-112f0bd7b902
            © Shamal Faily et al. Published by BCS Learning and Development Ltd. Proceedings of the 28th International BCS Human Computer Interaction Conference (HCI 2014), Southport, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 28th International BCS Human Computer Interaction Conference (HCI 2014)
            HCI
            28
            Southport, UK
            9 - 12 September 2014
            Electronic Workshops in Computing (eWiC)
            BCS Human Computer Interaction Conference (HCI 2014)
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2014.29
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Policy,Access Control,Affinity Diagram,HCI-Security

            Comments

            Comment on this article