Systematic literature review on usability of firewall configuration
Firewalls are network security components that handle incoming and outgoing network
traffic based on a set of rules. The process of correctly configuring a firewall is complicated …
traffic based on a set of rules. The process of correctly configuring a firewall is complicated …
SoK: Access Control Policy Generation from High-level Natural Language Requirements
SH Jayasundara… - ACM Computing …, 2024 - dl.acm.org
Administrator-centered access control failures can cause data breaches, putting
organizations at risk of financial loss and reputation damage. Existing graphical policy …
organizations at risk of financial loss and reputation damage. Existing graphical policy …
Prototy** an end-user user interface for the solid application interoperability specification under GDPR
H Bailly, A Papanna, R Brennan - European Semantic Web Conference, 2023 - Springer
This paper describes prototy** of the draft Solid application interoperability specification
(INTEROP). We developed and evaluated a dynamic user interface (UI) for the new Solid …
(INTEROP). We developed and evaluated a dynamic user interface (UI) for the new Solid …
Supporting users in data disclosure scenarios in agriculture through transparency
S Linsner, E Steinbrink, F Kuntke… - Behaviour & …, 2022 - Taylor & Francis
Business collaboration in the era of digital transformation requires the exchange of
operational data. Since data are hardly controllable once they have been published or …
operational data. Since data are hardly controllable once they have been published or …
A visualization tool for evaluating access control policies in facebook-style social network systems
Understanding the privacy implication of adopting a certain privacy setting is a complex task
for the users of social network systems. Users need tool support to articulate potential …
for the users of social network systems. Users need tool support to articulate potential …
Is visualization enough? evaluating the efficacy of mud-visualizer in enabling ease of deployment for manufacturer usage description (mud)
The IETF Manufacturer Usage Description (MUD) standard was designed to protect IoT
devices through network micro-segmentation. In practice, this is implemented using per …
devices through network micro-segmentation. In practice, this is implemented using per …
Question answering on lecture videos: a multifaceted approach
In this paper, we introduce a multifaceted approach for question answering on lecture videos
Text extracted from PowerPoint slides associated with the lecture videos is used as a source …
Text extracted from PowerPoint slides associated with the lecture videos is used as a source …
How users bypass access control and why: the impact of authorization problems on individuals and the organization
Many organizations struggle with ineffective and/or inefficient access control, but these
problems and their consequences often remain invisible to security decision-makers. Prior …
problems and their consequences often remain invisible to security decision-makers. Prior …
Effective collaboration in the management of access control policies: A survey of tools
Access control (AC) tools implement security policies for controlling access to various
assets, including file systems, physical resources, and social media posts. They are also …
assets, including file systems, physical resources, and social media posts. They are also …
Making access control easy in IoT
Secure installation of Internet of Things (IoT) devices requires configuring access control
correctly for each device. In order to enable correct configuration Manufacturer Usage …
correctly for each device. In order to enable correct configuration Manufacturer Usage …