How much negotiation and detail can users handle? Experiences with security negotiation and the granularity of access control in communications

6Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.

Abstract

Tailor made security is being enabled by more options for specifying security policies and enhanced possibilities for negotiating security. On the other side these new options raise the complexity of transactions and systems: Users can be overwhelmed, which can lead to less security than before. This paper describes conclusions from a case study and trial of a personal reachability and security manager for telephone based communication. The device helped to negotiate and balance security requirements. The study analysed how much negotiation and detail users could handle during their day-to-day transactions and how they could be supported. Some results are strongly related to more ‘classic’ security techniques like access control that are becoming more and more interactive: When users learn to understand the consequences of their access control decisions and can tune their policies these mature to a satisfying level. When users see advantages for their daily activities they are willing to invest more time into understanding additional complexity.

Cite

CITATION STYLE

APA

Rannenberg, K. (2000). How much negotiation and detail can users handle? Experiences with security negotiation and the granularity of access control in communications. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1895, pp. 37–54). Springer Verlag. https://doi.org/10.1007/10722599_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free