Access Control by Testing for Shared Knowledge

被引:0
|
作者
Toomim, Michael [1 ]
Zhang, Xianhang
Fogarty, James [1 ]
Landay, James A. [1 ]
机构
[1] Univ Washington, DUB Grp, Seattle, WA 98195 USA
关键词
Privacy; Access Control; Photo Sharing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Controlling the privacy of online content is difficult and often confusing. We present a social access control where users devise simple questions of shared knowledge instead of constructing authenticated accounts and explicit access control rules. We implemented a prototype and conducted studies to explore the context of photo sharing security, gauge the difficulty of creating shared knowledge questions, measure their resilience to adversarial attack, and evaluate user ability to understand and predict this resilience.
引用
收藏
页码:193 / 196
页数:4
相关论文
共 50 条
  • [1] Access control for shared resources
    Wilde, Erik
    Nabholz, Nick
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MODELLING, CONTROL & AUTOMATION JOINTLY WITH INTERNATIONAL CONFERENCE ON INTELLIGENT AGENTS, WEB TECHNOLOGIES & INTERNET COMMERCE, VOL 1, PROCEEDINGS, 2006, : 256 - +
  • [2] Hierarchical and Shared Access Control
    Castiglione, Arcangelo
    De Santis, Alfredo
    Masucci, Barbara
    Palmieri, Francesco
    Castiglione, Aniello
    Li, Jin
    Huang, Xinyi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 850 - 865
  • [3] Access Control for Shared Remote Laboratories
    Mateos, Veronica
    Bellidoa, Luis
    Villagra, Victor A.
    Richter, Thomas
    Gallardo, Alberto
    [J]. JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2012, 44 (02): : 111 - 128
  • [4] CONTROL OF THE ACCESS TO A SHARED BUS - ARBITERS
    SECK, JP
    COURVOISIER, M
    GEFFROY, JC
    [J]. RAIRO-AUTOMATIQUE-SYSTEMS ANALYSIS AND CONTROL, 1983, 17 (04): : 359 - 403
  • [5] Access control in shared access networks supporting Internet DiffServ
    Angelopoulos, JD
    Leligou, N
    Orphanoudakis, T
    Pikrammenos, G
    Sifnaios, J
    Venieris, IS
    [J]. NEW TRENDS IN OPTICAL NETWORK DESIGN AND MODELING, 2001, 62 : 235 - 246
  • [6] On the performance of shared access control strategy for femtocells
    Magableh, Amer M.
    Radaydeh, Redha M.
    Alouini, Mohamed-Slim
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2013, 24 (02): : 244 - 256
  • [7] Access Control Enforcement Testing
    El Kateb, Donia
    ElRakaiby, Yehia
    Mouelhi, Tejeddine
    Le Traon, Yves
    [J]. 2013 8TH INTERNATIONAL WORKSHOP ON AUTOMATION OF SOFTWARE TEST (AST), 2013, : 64 - 70
  • [8] Inroads in Testing Access Control
    Mouelhi, Tejeddine
    El Kateb, Donia
    Le Traon, Yves
    [J]. ADVANCES IN COMPUTERS, VOL 99, 2015, 99 : 195 - 222
  • [9] Similarity testing for access control
    Bertolino, Antonia
    Daoudagh, Said
    El Kateb, Donia
    Henard, Christopher
    Le Traon, Yves
    Lonetti, Francesca
    Marchetti, Eda
    Mouelhi, Tejeddine
    Papadakis, Mike
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2015, 58 : 355 - 372
  • [10] Decrypting network traffic-shared access control
    Vidya, K. P.
    [J]. WCECS 2007: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, 2007, : 274 - 279