Browsing by Subject "security"
1 - 2 of 2
Results Per Page
Sort Options
- Text DocumentAn Access Control Framework for Multi-User Collaborative Environments(Proceedings of the 1999 ACM International Conference on Supporting Group Work, 1999) Bullock, Adrian; Benford, SteveA vital component of any application or environment is security, and yet this is often one of the lower priorities, losing out to performance and functionality issues, if it is considered at all. This paper considers a spatial approach to enabling, understanding and managing access control that is generally applicable across a range of collaborative environments and applications. Access control is governed according to the space within which subjects and objects reside, and the ability to traverse space to get close to an object. We present a framework that enables the SPACE access model [4], previously presented as an access model solely for collaborative virtual environments, to be applied across a number of collaborative systems. This framework is exemplified through mappings of the model to 3D and 2D collaborative environments, namely Spline [1], TeamRooms [19] and Orbit [16]. One particularly interesting feature of the model is the way in which it handles group access by considering how group credentials are determined. These credentials are presented to the model in the usual manner. We conclude by presenting some limitations of our approach, and workarounds.
- Conference PaperPrivacy Norms within the Internet of Things Using Contextual Integrity(Companion Proceedings of the 2020 ACM International Conference on Supporting Group Work, 2020) Abaquita, Denielle; Bahirat, Paritosh; Badillo-Urquiola, Karla A.; Wisniewski, PamelaThe collection of devices networked via the internet, also referred to as the Internet of Things, is poised to grow in adoption. With this rise has come equally increasing concerns for security and privacy. Considering Nissenbaum's framework of Contextual Integrity, we examined users' perceptions of IoT environmental and wearable devices to investigate acceptable norms surrounding privacy perceptions. We present results from a qualitative analysis of an interview study of 19 parent-young adult dyads to give insights on how privacy norms in context of two IoT environments were varying across two generations. We strongly believe understanding these variations can inform IoT system designs and government policies concerning the privacy and management of IoT devices.