Access Control by Testing for Shared Knowledge

被引:0
|
作者
Toomim, Michael [1 ]
Zhang, Xianhang
Fogarty, James [1 ]
Landay, James A. [1 ]
机构
[1] Univ Washington, DUB Grp, Seattle, WA 98195 USA
关键词
Privacy; Access Control; Photo Sharing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Controlling the privacy of online content is difficult and often confusing. We present a social access control where users devise simple questions of shared knowledge instead of constructing authenticated accounts and explicit access control rules. We implemented a prototype and conducted studies to explore the context of photo sharing security, gauge the difficulty of creating shared knowledge questions, measure their resilience to adversarial attack, and evaluate user ability to understand and predict this resilience.
引用
收藏
页码:193 / 196
页数:4
相关论文
共 50 条
  • [31] Collaborative two level access control mechanism for shared XML warehouse
    Zhang, WS
    Liu, DX
    [J]. CONCURRENT ENGINEERING: THE WORLDWIDE ENGINEERING GRID, PROCEEDINGS, 2004, : 115 - 119
  • [32] Toward Fully-Shared Access: Hybrid ISP Traffic Control Architecture and Service Plans Exploiting Excess Bandwidth in Shared Access Networks
    Kim, Kyeong Soo
    [J]. 2016 INTERNATIONAL WORKSHOP ON FIBER OPTICS IN ACCESS NETWORK (FOAN), 2016,
  • [33] Co-op students' access to shared knowledge in science-rich workplaces
    Munby, Hugh
    Taylor, Jennifer
    Chin, Peter
    Hutchinson, Nancy L.
    [J]. SCIENCE EDUCATION, 2007, 91 (01) : 115 - 132
  • [34] An access control model based on distributed knowledge management
    Seleznyov, A
    Hailes, S
    [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 403 - 406
  • [35] Assessment of Access Control Systems Using Mutation Testing
    Daoudagh, Said
    Lonetti, Francesca
    Marchetti, Eda
    [J]. 2015 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON TECHNICAL AND LEGAL ASPECTS OF DATA PRIVACY AND SECURITY TELERISE 2015, 2015, : 8 - 13
  • [36] Testing Access Control List Policies in a Hadoop Environment
    Maakoul, Oussama
    Tajioue, Mohammed Amine
    Hsaini, Sara
    Azzouzi, Salma
    Charaf, My El Hassan
    [J]. 2020 7TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT'20), VOL 1, 2020, : 831 - 836
  • [37] Control of HIV epidemic: improve access to testing and ART
    Vermund, Sten H.
    [J]. LANCET HIV, 2017, 4 (12): : E533 - E534
  • [38] A Decentralized Solution for Combinatorial Testing of Access Control Engine
    Daoudagh, Said
    Lonetti, Francesca
    Marchetti, Eda
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 126 - 135
  • [39] Enabling Verification and Conformance Testing for Access Control Model
    Hu, Hongxin
    Ahn, Gail-Joon
    [J]. SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 195 - 204
  • [40] Importance of electronic access control systems and the need for their testing
    Boros, Martin
    Lenko, Filip
    [J]. 2020 INTERNATIONAL CONFERENCE ON DIAGNOSTICS IN ELECTRICAL ENGINEERING, DIAGNOSTIKA, 2020, : 134 - 137