Proceedings of the 38th Annual Hawaii International Conference on System Sciences
DOI: 10.1109/hicss.2005.650
|View full text |Cite
|
Sign up to set email alerts
|

Usability of Decentralized Authorization Systems - A Comparative Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Al Abdulwahid, Clarke, Stengel, Furnell, and Reich (2015) undertook a survey of users where they found that users systematically did not adequately protect themselves, perhaps because of the inconvenience of the technology. Liimatainen (2005), in a study to search for usability problems of decentralized authorization systems, identifies various usability problems within systems security context and they include "authorization of entities, definition of a security policy for a resource, revocation of rights, checking validity of a set of credentials, privacy of users, and distinguishing trusted channels. Whitten and Tygar (1999) present that a security system is usable if, apart from other aspects, its users are aware of the security risks and know how to perform the necessary tasks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Al Abdulwahid, Clarke, Stengel, Furnell, and Reich (2015) undertook a survey of users where they found that users systematically did not adequately protect themselves, perhaps because of the inconvenience of the technology. Liimatainen (2005), in a study to search for usability problems of decentralized authorization systems, identifies various usability problems within systems security context and they include "authorization of entities, definition of a security policy for a resource, revocation of rights, checking validity of a set of credentials, privacy of users, and distinguishing trusted channels. Whitten and Tygar (1999) present that a security system is usable if, apart from other aspects, its users are aware of the security risks and know how to perform the necessary tasks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…There have been usability studies that used both methods as well (e.g., Liimatainen, 2005; Ackad, Collins, & Kay, 2010). It has been suggested that a combination of different techniques is preferred for evaluating the healthcare technologies (Jaspers, 2009).…”
Section: Related Workmentioning
confidence: 99%
“…SPKI (Liimatainen, 2005) is an authorization certificate system similar to AC. But, unlike AC, it does not have any centralized CA to whom all must trust.…”
Section: Spkimentioning
confidence: 99%