Access Right Assignment Mechanisms for Secure Home Networks
![]() ![]() |
Kim, Tiffany Hyun-Jin
(Department of Electrical and Computer Engineering, Carnegie Mellon University)
Bauer, Lujo (Department of Electrical and Computer Engineering, Carnegie Mellon University) Newsome, James (Department of Electrical and Computer Engineering, Carnegie Mellon University) Perrig, Adrian (Department of Electrical and Computer Engineering, Carnegie Mellon University) Walker, Jesse (Intel Corporation) |
1 | S. Hazelhurst, A. Attar, and R. Sinnappan, "Algorithms for improving the dependability of firewall and filter rule lists," in Proc. Int. Conf. Dependable Systems and Networks, 2000. |
2 | E. S. Al-Shaer and H. H. Hamed, "Firewall policy advisor for anomaly detection and rule editing," in Proc. Int. Symp. Integr. Network Manage., 2003. |
3 | F. Le, S. Lee, T. Wong, H. S. Kim, and D. Newcomb, "Minerals: Using data mining to detect router misconfigurations," in Proc. SIGCOMM Workshop on Mining Network Data, 2006. |
4 | L. Bauer, S. Garriss, and M. K. Reiter, "Detecting and resolving policy misconfigurations in access-control systems," in Proc. ACM Symp. Access Control Models and Technol., 2008. |
5 | M. Kuhlmann, D. Shohat, and G. Schimpf, "Role mining-revealing business roles for security administration using data mining technology," in Proc. ACM SACMAT, 2003. |
6 | J. Schlegelmilch and U. Steffens, "Role mining with ORCA," in Proc. ACM SACMAT, 2005. |
7 | R. Campbell, J. Al-Muhtadi, P. Naldurg, G. Sampemane, and M. D. Mickunas, "Towards security and privacy for pervasive computing," in Proc. Theories and Systems, Mext-NSF-JSPS (ISSS), 2002. |
8 | M. Romn, C. K. Hess, R. Cerqueira, A. Ranganathan, R. H. Campbell, and K. Nahrstedt, "Gaia: A middleware infrastructure to enable active spaces," IEEE Pervasive Comput., vol.1 no. 2, pp. 74-83, 2002. |
9 | P. Argyroudis and D. O'Mahony, "Securing communications in the smart home," in Proc. EUC, 2004. |
10 | K. Kostiainen, O. Rantapuska, S. Moloney, V. Roto, U. Holmstrom, and K. Karvonen, "Usable access control inside home networks," Nokia Research Center, Tech. Rep. NRC-TR-2007-009, 2007. |
11 | A.Marin, W.Mueller, R. Schaefer, F. Almenarez, D. Diaz, and M. Ziegler, "Middleware for secure home access and control," in Proc. IEEE Int. Conf. Pervasive Comput. and Commun. Workshops, 2007. |
12 | M. Johnson and F. Stajano, "Usability of security management: Defining the permissions of guests," in Proc. The Security Protocols Workshop, 2006. |
13 | A. J. B. Brush and K. M. Inkpen, "Yours, mine and ours? Sharing and use of technology in domestic environments," in Proc. Ubicomp, 2007. |
14 | P. Bergstrom, K. Driscoll, and J. Kimball, "Making home automation communications secure," Computer, vol. 34, no. 10, pp. 50-56, 2001. DOI ScienceOn |
15 | J. M. McCune, A. Perrig, and M. K. Reiter, "Seeing-is-believing: Using camera phones for human-verifiable authentication," in Proc. IEEE Symp. Security and Privacy, 2005. |
16 | M. Weiser, "The computer for the twenty-first century," Scientific American, vol. 265, pp. 94-104, Sept. 1991. |
17 | T. H.-J. Kim, L. Bauer, J. Newsome, A. Perrig, and J.Walker, "Challenges in access right assignment for secure home networks," in Proc. USENIX HotSec, 2010. |
18 | D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong, "Talking to strangers: Authentication in ad-hoc wireless networks," in Proc. NDSS, 2002. |
19 | M. Blaze, J. Feigenbaum, and A. D. Keromytis, "KeyNote: Trust management for public-key infrastructures," in Proc. Int. Workshop on Security Protocols, 1999. |
20 | M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis, "The Key-Note trust management system," Internet Request for Comment RFC 2704, Internet Engineering Task Force, 1999. |
21 | M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized trust management," in Proc. IEEE Symp. Research in Security and Privacy, 1996. |
22 | Trusted Computing Group, "Trusted platform module main specification, Part 1: Design principles, Part 2: TPM structures, Part 3: Commands," Version 1.2, Revision 103, 2007. |
23 | C. A. Brodie, C.-M. Karat, and J. Karat, "An empirical study of natural language parsing of privacy policy rules using the sparcle policy workbench," in Proc. The Second Symp. Usable Privacy and Security, 2006. |
24 | A. K. Karlson, A. B. Brush, and S. Schechter, "Can I borrow your phone?: Understanding concerns when sharing mobile phones," in Proc. Int. Conf. Human Factors in Comput. Syst., 2009. |
25 | R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter, K. Bacon, K. How, and H. Strong, "Expandable grids for visualizing and authoring computer security policies," in Proc. Conf. Human Factors in Comput. Syst., 2008. |
26 | J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor, "Crying wolf: An empirical study of SSL warning effectiveness," in Proc. USENIX Security, 2009. |
27 | M. L. Mazurek, J. Arsenault, J. Breese, N. Gupta, I. Ion, C. Johns, D. Lee, Y. Liang, J. Olsen, B. Salmon, R. Shay, K. Vaniea, L. Bauer, L. F. Cranor, G. R. Ganger, and M. K. Reiter, "Access control for home data sharing: Attitudes, needs, and practices," in Proc. Int. Conf. Human Factors in Comput. Syst., 2010. |
28 | L. Bauer, L. Cranor, R. W. Reeder, M. K. Reiter, and K. Vaniea, "Real life challenges in access-control management," in Proc. Conf. Human Factors in Comput. Syst., 2009. |
29 | J. M. Seigneur, C. D. Jensen, S. Farrell, E. Gray, and Y. Chen, "Towards security auto-configuration for smart appliances," in Proc. The Smart Objects Conf., 2003. |
30 | G. Ananthanarayanan, R. Venkatesan, P. Naldurg, S. Blagsvedt, and A. Hemakumar, "Space: Secure protocol for address-book based connection establishment," in Proc. HotNets, 2006. |
31 | L. Bauer, S. Garriss, J. M. McCune, M. K. Reiter, J. Rouse, and P. Rutenbar, "Device-enabled authorization in the grey system," in Proc. The Int. Conf. Inf. Security, 2005. |
32 | L. Bauer, L. Cranor, R. W. Reeder, M. K. Reiter, and K. Vaniea, "A user study of policy creation in a flexible access-control system," in Proc. Conf. Human Factors in Comput. Syst., 2008. |
33 | A. Beaufour and P. Bonnet, "Personal servers as digital keys," in Proc. IEEE Int. Conf. Pervasive Comput. Commun., 2004. |
34 | F. Zhu, M. W. Mutka, and L. M. Ni, "The master key: A private authentication approach for pervasive computing environments," in Proc. IEEE Int. Conf. Pervasive Comput. Commun., 2006. |
35 | A. Mayer, A. Wool, and E. Ziskind, "Fang: A firewall analysis engine," in Proc. IEEE Symp. Security and Privacy, 2000. |
![]() |