Download now Free registration required
Significant effort has been invested in developing expressive and flexible access-control languages and systems. However, little has been done to evaluate these systems in practical situations with real users, and few attempts have been made to discover and analyze the access-control policies that users actually want to implement. The authors report on a user study in which people derive the ideal access policies desired by a group of users for physical security in an office environment. They compare these ideal policies to the policies the users actually implemented with keys and with a smartphone-based distributed access-control system.
- Format: PDF
- Size: 368.2 KB