![]() ; Lenzini, Gabriele ![]() in Proc. of the nd Int. Conference on International Conference in Information Systems Security and Privacy (ICISSP) (2016) In healthcare security, Role-based Access Control (RBAC) should be flexible and include capabilities such as Break-the-Glass and Delegation. The former is useful in emergencies to overcome otherwise a ... [more ▼] In healthcare security, Role-based Access Control (RBAC) should be flexible and include capabilities such as Break-the-Glass and Delegation. The former is useful in emergencies to overcome otherwise a denial of access, the latter to transfer rights temporarily, for example, to substitute doctors. Current research studies these policies separately, but it is unclear whether they are different and independent capabilities. Motivated to look into this matter, we present a formal characterization of Break-the-Glass andDelegation in the RBAC model and we inquire on how these two policies relate. After giving arguments in favour of keeping them apart as different policies, we propose an RBAC model that includes them [less ▲] Detailed reference viewed: 254 (5 UL)![]() ; ; Koenig, Vincent ![]() in Proc. of the International Conference on Human Aspects of Information Security, Privacy, and Trust (2015, July 21) We study whether the padlock and the signal strength bars, two visual cues shown in network managers, convey their intended messages. Since users often choose insecure networks when they should not ... [more ▼] We study whether the padlock and the signal strength bars, two visual cues shown in network managers, convey their intended messages. Since users often choose insecure networks when they should not, finding the answer is not obvious; in our study we clarify whether the problem lies in uninformative and ambiguous cues or in the user who, despite understanding the cues, chooses otherwise. This paper describes experiments and comments the results that bring evidence to our study [less ▲] Detailed reference viewed: 111 (1 UL)![]() ; Lenzini, Gabriele ![]() in Proc. of the 5th International Workshop on Socio-Technical Security and Trust (2015) Detailed reference viewed: 303 (9 UL)![]() Pierina Brustolin Spagnuelo, Dayana ![]() ![]() Learning material (n.d.) Detailed reference viewed: 135 (12 UL) |
||