Systematic literature review on usability of firewall configuration

A Voronkov, LH Iwaya, LA Martucci… - ACM Computing Surveys …, 2017 - dl.acm.org
Firewalls are network security components that handle incoming and outgoing network
traffic based on a set of rules. The process of correctly configuring a firewall is complicated …

SoK: Access Control Policy Generation from High-level Natural Language Requirements

SH Jayasundara… - ACM Computing …, 2024 - dl.acm.org
Administrator-centered access control failures can cause data breaches, putting
organizations at risk of financial loss and reputation damage. Existing graphical policy …

Prototy** an end-user user interface for the solid application interoperability specification under GDPR

H Bailly, A Papanna, R Brennan - European Semantic Web Conference, 2023 - Springer
This paper describes prototy** of the draft Solid application interoperability specification
(INTEROP). We developed and evaluated a dynamic user interface (UI) for the new Solid …

Supporting users in data disclosure scenarios in agriculture through transparency

S Linsner, E Steinbrink, F Kuntke… - Behaviour & …, 2022 - Taylor & Francis
Business collaboration in the era of digital transformation requires the exchange of
operational data. Since data are hardly controllable once they have been published or …

A visualization tool for evaluating access control policies in facebook-style social network systems

M Anwar, PWL Fong - Proceedings of the 27th annual ACM Symposium …, 2012 - dl.acm.org
Understanding the privacy implication of adopting a certain privacy setting is a complex task
for the users of social network systems. Users need tool support to articulate potential …

Is visualization enough? evaluating the efficacy of mud-visualizer in enabling ease of deployment for manufacturer usage description (mud)

V Andalibi, J Dev, DI Kim, E Lear, LJ Camp - Proceedings of the 37th …, 2021 - dl.acm.org
The IETF Manufacturer Usage Description (MUD) standard was designed to protect IoT
devices through network micro-segmentation. In practice, this is implemented using per …

Question answering on lecture videos: a multifaceted approach

J Cao, JF Nunamaker - Proceedings of the 4th ACM/IEEE-CS joint …, 2004 - dl.acm.org
In this paper, we introduce a multifaceted approach for question answering on lecture videos
Text extracted from PowerPoint slides associated with the lecture videos is used as a source …

How users bypass access control and why: the impact of authorization problems on individuals and the organization

S Bartsch, MA Sasse - 2012 - discovery.ucl.ac.uk
Many organizations struggle with ineffective and/or inefficient access control, but these
problems and their consequences often remain invisible to security decision-makers. Prior …

Effective collaboration in the management of access control policies: A survey of tools

R Fernandez, PCH Cheng, A Nhlabatsi, KM Khan… - IEEE …, 2023 - ieeexplore.ieee.org
Access control (AC) tools implement security policies for controlling access to various
assets, including file systems, physical resources, and social media posts. They are also …

Making access control easy in IoT

V Andalibi, J Dev, DI Kim, E Lear, LJ Camp - … 2021, Virtual Event, July 7–9 …, 2021 - Springer
Secure installation of Internet of Things (IoT) devices requires configuring access control
correctly for each device. In order to enable correct configuration Manufacturer Usage …