Home automation in the wild: challenges and opportunities
Visions of smart homes have long caught the attention of researchers and considerable
effort has been put toward enabling home automation. However, these technologies have …
effort has been put toward enabling home automation. However, these technologies have …
An operating system for the home
Network devices for the home such as remotely controllable locks, lights, thermostats,
cameras, and motion sensors are now readily available and inexpensive. In theory, this …
cameras, and motion sensors are now readily available and inexpensive. In theory, this …
Why Johnny doesn't use two factor a two-phase usability study of the FIDO U2F security key
Why do individuals choose to use (or not use) Two Factor Authentication (2FA)? We sought
to answer this by implementing a two-phase study of the Yubico Security Key. We analyzed …
to answer this by implementing a two-phase study of the Yubico Security Key. We analyzed …
[PDF][PDF] The current state of access control for smart devices in homes
B Ur, J Jung, S Schechter - … on home usable privacy and security …, 2013 - cups.cs.cmu.edu
Although connected devices and smart homes are now marketed to average consumers,
little is known about how access-control systems for these devices fare in the real world. In …
little is known about how access-control systems for these devices fare in the real world. In …
[PDF][PDF] Location privacy in location-based services: Beyond TTP-based schemes
Location-Based Services (LBS) are gaining importance due to the advances in mobile
networks and positioning technologies. Nevertheless, the wide deployment of LBS can …
networks and positioning technologies. Nevertheless, the wide deployment of LBS can …
Access control for home data sharing: Attitudes, needs and practices
As digital content becomes more prevalent in the home, non-technical users are
increasingly interested in sharing that content with others and accessing it from multiple …
increasingly interested in sharing that content with others and accessing it from multiple …
A summary of survey methodology best practices for security and privacy researchers
Abstract" Given a choice between dancing pigs and security, users will pick dancing pigs
every time," warns an oft-cited quote from well-known security researcher Bruce Schneier …
every time," warns an oft-cited quote from well-known security researcher Bruce Schneier …
Real life challenges in access-control management
In this work we ask the question: what are the challenges of managing a physical or file
system access-control policy for a large organization? To answer the question, we …
system access-control policy for a large organization? To answer the question, we …
SoK: Social Cybersecurity
We analyze prior work in social cybersecurity and present a structuring of this literature
based on its pertinence to four S&P-relevant social behaviors:(1) negotiating access to …
based on its pertinence to four S&P-relevant social behaviors:(1) negotiating access to …
The home needs an operating system (and an app store)
We argue that heterogeneity is hindering technological innovation in the home---homes
differ in terms of their devices and how those devices are connected and used. To abstract …
differ in terms of their devices and how those devices are connected and used. To abstract …