Skip to main content

2013 | OriginalPaper | Buchkapitel

8. Enhancing the Security and Usability of Dui Based Collaboration with Proof Based Access Control

verfasst von : Marcel Heupel, Mohamed Bourimi, Philipp Schwarte, Dogan Kesdogan, Thomas Barth, Pedro G. Villanueva

Erschienen in: Distributed User Interfaces: Usability and Collaboration

Verlag: Springer London

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Managing access control (AC) of shared resources is at the heart of any collaboration platform. Thereby, the usability of used AC techniques is crucial for projects with high expectations to fast response times within targeted collaboration processes. In this paper, we address the special case of using the anonymous credential system idemix in a project dealing with distributed user interfaces (DUIs) to enhance decision making in disaster situations. We show the potential of using idemix to enhance the usability of decision making in crisis situations by using DUIs while considering security and privacy. We present this exemplary by means of a developed prototypic collaborative environment, composed by a WallShare based server-side and mobile application for supporting collaborative scenarios within the ReSCUeIT project. Since DUI based collaboration demands wide-support of multiple devices, especially mobile ones, we further present IdeREST, a REST-full idemix integration and idemiX++, the first C++ based implementation of idemix worldwide, to the best of our knowledge. With both we show how to overcome the current gap related to the simultaneous support on non-Java devices such as Windows Phone 7/8 along with performance improvements on Android based platforms when using idemix as an exemplary anonymous credential system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Fußnoten
1
ReSCUeIT: Robust and secure supply-chain supporting IT. http://​www.​sichere-warenketten.​de
 
2
di.me: Integrated digital.me Userware. http://​www.​dime-project.​eu
 
Literatur
1.
Zurück zum Zitat Hong, J. I., & Landay, J. A. (2004). An architecture for privacy-sensitive ubiquitous computing. MobiSys’04: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services (pp. 177–189). ACM, New York. Hong, J. I., & Landay, J. A. (2004). An architecture for privacy-sensitive ubiquitous computing. MobiSys’04: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services (pp. 177–189). ACM, New York.
2.
Zurück zum Zitat Cranor, L., & Garfinkel, S. (2005). Security and usability. Sebastopol: O’Reilly Media. Cranor, L., & Garfinkel, S. (2005). Security and usability. Sebastopol: O’Reilly Media.
3.
Zurück zum Zitat Palen, L., & Dourish, P. (2003). Unpacking “privacy” for a networked world. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’03) (pp. 129–136). ACM Press, New York. Palen, L., & Dourish, P. (2003). Unpacking “privacy” for a networked world. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’03) (pp. 129–136). ACM Press, New York.
4.
Zurück zum Zitat Shneiderman, B., Plaisant, C., Cohen, M., & Jacobs, S. (2010). Designing the user interface: Strategies for effective human-computer interaction (5th ed.). Reading: Addison Wesley. Shneiderman, B., Plaisant, C., Cohen, M., & Jacobs, S. (2010). Designing the user interface: Strategies for effective human-computer interaction (5th ed.). Reading: Addison Wesley.
5.
Zurück zum Zitat Boyle, M., Neustaedter, C., & Greenberg, S. (2008). Privacy factors in video-based media spaces. In S. Harrision (Ed.), Media space: 20+ years of mediated life (pp. 99–124). Berlin: Springer. Boyle, M., Neustaedter, C., & Greenberg, S. (2008). Privacy factors in video-based media spaces. In S. Harrision (Ed.), Media space: 20+ years of mediated life (pp. 99–124). Berlin: Springer.
6.
Zurück zum Zitat Bullock, A., & Benford, S. (1999). An access control framework for multi-user collaborative environments. Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work. GROUP’99 (pp. 140–149). ACM, New York. Bullock, A., & Benford, S. (1999). An access control framework for multi-user collaborative environments. Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work. GROUP’99 (pp. 140–149). ACM, New York.
7.
Zurück zum Zitat Haake, J. M., Haake, A., Schu ̈mmer, T., Bourimi, M., & Landgraf, B. (2004). End-user controlled group formation and access rights management in a shared workspace system. CSCW’04: Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work (pp. 554–563). ACM Press, Chicago, 6–10 Nov 2004. Haake, J. M., Haake, A., Schu ̈mmer, T., Bourimi, M., & Landgraf, B. (2004). End-user controlled group formation and access rights management in a shared workspace system. CSCW’04: Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work (pp. 554–563). ACM Press, Chicago, 6–10 Nov 2004.
8.
Zurück zum Zitat Camenisch, J., & Van Herreweghen, E. (2002). Design and implementation of the idemix anonymous credential system. CCS’02: Proceedings of the 9th ACM Conference on Computer and Communications Security (pp. 21–30). ACM, New York. Camenisch, J., & Van Herreweghen, E. (2002). Design and implementation of the idemix anonymous credential system. CCS’02: Proceedings of the 9th ACM Conference on Computer and Communications Security (pp. 21–30). ACM, New York.
9.
Zurück zum Zitat Bichsel, P., & Camenisch, J. (2010). Mixing identities with ease. In E. De Leeuw, S. Fischer-Hübner, & L. Fritsch (Eds.), IFIP working conference on policies: Research in identity management (IDMAN’10) (pp. 1–17). Springer. Bichsel, P., & Camenisch, J. (2010). Mixing identities with ease. In E. De Leeuw, S. Fischer-Hübner, & L. Fritsch (Eds.), IFIP working conference on policies: Research in identity management (IDMAN’10) (pp. 1–17). Springer.
10.
Zurück zum Zitat Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., & Smith, J. M. (2010). Smudge attacks on smartphone touch screens. Proceedings of the 4th USENIX Conference on Offensive Technologies. WOOT’10, Berkeley (pp. 1–7). USENIX Association. Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., & Smith, J. M. (2010). Smudge attacks on smartphone touch screens. Proceedings of the 4th USENIX Conference on Offensive Technologies. WOOT’10, Berkeley (pp. 1–7). USENIX Association.
11.
Zurück zum Zitat Kryszczuk, K., & Drygajlo, A. (2008). Credence estimation and error prediction in biometric identity verification. Signal Processing, 88(4), 916–925.CrossRefMATH Kryszczuk, K., & Drygajlo, A. (2008). Credence estimation and error prediction in biometric identity verification. Signal Processing, 88(4), 916–925.CrossRefMATH
12.
Zurück zum Zitat Corella, F., & Lewison, K. (2012). Strong and convenient multi-factor authentication on mobiles devices. Corella, F., & Lewison, K. (2012). Strong and convenient multi-factor authentication on mobiles devices.
13.
Zurück zum Zitat Schwarte, P., Bourimi, M., Heupel, M., Kesdogan, D., Gimenez R., Wrobel, S., & Thiel, S. (2013). Multilaterally secure communication anonymity in decentralized social networking. To appear in: Proceedings of the 10th International Conference on Information Technology: New Generations (ITNG), Las Vegas. Schwarte, P., Bourimi, M., Heupel, M., Kesdogan, D., Gimenez R., Wrobel, S., & Thiel, S. (2013). Multilaterally secure communication anonymity in decentralized social networking. To appear in: Proceedings of the 10th International Conference on Information Technology: New Generations (ITNG), Las Vegas.
14.
Zurück zum Zitat Barth, T., Fielenbach, T., Bourimi, M., Kesdogan, D., & Villanueva, P. (2011). Supporting distributed decision making using secure distributed user interfaces. In J. A. Gallud, R. Tesoriero, & V. M. Penichet (Eds.), Distributed user interfaces (Human-computer interaction series, pp. 177–184). London: Springer.CrossRef Barth, T., Fielenbach, T., Bourimi, M., Kesdogan, D., & Villanueva, P. (2011). Supporting distributed decision making using secure distributed user interfaces. In J. A. Gallud, R. Tesoriero, & V. M. Penichet (Eds.), Distributed user interfaces (Human-computer interaction series, pp. 177–184). London: Springer.CrossRef
15.
Zurück zum Zitat Heupel, M. (2010). Porting and evaluating the performance of idemix and tor anonymity on modern smartphones. Master’s thesis, University of Siegen. Heupel, M. (2010). Porting and evaluating the performance of idemix and tor anonymity on modern smartphones. Master’s thesis, University of Siegen.
16.
Zurück zum Zitat Villanueva, P. G., Gallud, J. A., & Tesoriero, R. (2010). WallShare: A multi-pointer system for portable devices. AVI’10: Proceedings of the International Conference on Advanced Visual Interfaces, ACM Request Permissions. Villanueva, P. G., Gallud, J. A., & Tesoriero, R. (2010). WallShare: A multi-pointer system for portable devices. AVI’10: Proceedings of the International Conference on Advanced Visual Interfaces, ACM Request Permissions.
Metadaten
Titel
Enhancing the Security and Usability of Dui Based Collaboration with Proof Based Access Control
verfasst von
Marcel Heupel
Mohamed Bourimi
Philipp Schwarte
Dogan Kesdogan
Thomas Barth
Pedro G. Villanueva
Copyright-Jahr
2013
Verlag
Springer London
DOI
https://doi.org/10.1007/978-1-4471-5499-0_8

Neuer Inhalt