A Prototype User Interface for Coarse-Grained Desktop Access Control (CMU-CS-03-200)

作者: Courtney Moskowitz , Greg Ganger , A. Chris Long

DOI:

关键词:

摘要: Viruses, trojan horses, and other malware are a growing problem for computer users, but current tools research do not adequately aid users in fighting these threats. One approach to increasing security is partition all applications data based on general task types, or “roles,” such as “Personal,” “Work,” “Communications.” This can limit the effects of single role rather than allowing it affect entire computer. We developing prototype investigate usability this model. Our initial investigation uses cognitive walkthrough think-aloud user studies paper prototypes look at model context realistic tasks, compare different interface mechanisms managing role-based system. For most participants, our was simple understand use. In addition that intrinsically useful, we believe development system will inform issues design implementation usable interfaces, refinement guidelines. work supported by grants from Center Computer Communications Security (C3S) Carnegie Mellon University Critical Infrastructure Protection Information Assurance Fellowship Department Defense. thank members companies PDL Consortium (including EMC, Hewlett-Packard, Hitachi, IBM, Intel, Microsoft, Network Appliance, Oracle, Panasas, Seagate, Sun, Veritas) their interest, insights, feedback, support. also participants studies.

参考文章(17)
Dirk Balfanz, Daniel R. Simon, WindowBox: a simple security model for the connected desktop conference on usenix windows systems symposium. pp. 4- 4 ,(2000)
Alma Whitten, J. D. Tygar, Usability of Security: A Case Study, ,(1998)
Zishuang (Eileen) Ye, Sean Smith, Trusted Paths for Browsers usenix security symposium. pp. 263- 279 ,(2002)
M A Sasse, S Brostoff, D Weirich, Transforming the 'Weakest Link' — a Human/Computer Interaction Approach to Usable and Effective Security Bt Technology Journal. ,vol. 19, pp. 122- 131 ,(2001) , 10.1023/A:1011902718709
Nathaniel S. Good, Aaron Krekelberg, Usability and privacy: a study of Kazaa P2P file-sharing human factors in computing systems. pp. 137- 144 ,(2003) , 10.1145/642611.642636
Stuart K. Card, Allen Newell, Thomas P. Moran, The Psychology of Human-Computer Interaction ,(1983)
Steve Whittaker, Julia Hirschberg, The character, value, and management of personal paper archives ACM Transactions on Computer-Human Interaction. ,vol. 8, pp. 150- 170 ,(2001) , 10.1145/376929.376932
F. T. Grampp, R. H. Morris, TheUNIXSystem: UNIXOperating System Security AT&T Bell Laboratories Technical Journal. ,vol. 63, pp. 1649- 1672 ,(1984) , 10.1002/J.1538-7305.1984.TB00058.X
Han-Joon Kim, Sang-Goo Lee, A semi-supervised document clustering technique for information organization Proceedings of the ninth international conference on Information and knowledge management - CIKM '00. pp. 30- 37 ,(2000) , 10.1145/354756.354777