Usability of security management: Defining the permissions of guests

4Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Within the scenario of a Smart Home, we discuss the issues involved in allowing limited interaction with the environment for unidentified principals, or guests. The challenges include identifying and authenticating guests on one hand and delegating authorization to them on the other. While the technical mechanisms for doing so in generic distributed systems have been around for decades, existing solutions are in general not applicable to the smart home because they are too complex to manage. We focus on providing both security and usability; we therefore seek simple and easy to understand approaches that can be used by a normal computer-illiterate home owner, not just by a trained system administrator. This position paper describes ongoing research and does not claim to have all the answers. © 2009 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Johnson, M., & Stajano, F. (2009). Usability of security management: Defining the permissions of guests. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5087 LNCS, pp. 276–283). https://doi.org/10.1007/978-3-642-04904-0_36

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free