Abstract
A multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Krawczyk, H., Lubomski, P.: CoRBAC - kontekstowo zorientowany model bezpieczeństwa. Stud. Informatica 34(3), 185–194 (2013). (in polish)
Bursztein, E., Martin, M., Mitchell, J.: Text-based CAPTCHA strengths and weaknesses. In: Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS 2011, vol. 2011, p. 125. ACM Press, New York (2011)
Lubomski, P.: Context in security of distributed e-service environments. In: Proceedings of the Chip to Cloud Security Forum 2014, Marseille, France (2014)
Stanton, J.M., Stam, K.R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviors. Comput. Secur. 24(2), 124–133 (2005)
Balcerek, B., Frankowski, G., Kwiecień, A., Meyer, N., Nowak, M., Smutnicki, A.: Multilayered IT security requirements and measures for the complex protection of polish domain-specific grid infrastructure. In: Bubak, M., Kitowski, J., Wiatr, K. (eds.) PLGrid Plus. LNCS, vol. 8500, pp. 61–79. Springer, Heidelberg (2014)
Pahnila, S.P.S., Siponen, M.S.M., Mahmood, A.M.A.: Employees’ behavior towards IS security policy compliance. In: 2007 40th Annual Hawaii International Conference on System Sciences (HICSS 2007) (2007)
Furnell, S.: Usability versus complexity – striking the balance in end-user security. Netw. Secur. 12, 13–17 (2010)
Crawford, H., Renaud, K.: Understanding user perceptions of transparent authentication on a mobile device. J. Trust Manage. 1, 1–7 (2014)
Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J., Moody, K.: Using trust and risk in role-based access control policies. In: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies - SACMAT 2004, p. 156. ACM Press, New York (2004)
DeLone, W.H., McLean, E.R.: Information systems success: the quest for the dependent variable. Inf. Syst. Res. 3(1), 60–95 (1992)
Cuppens, F., Cuppens-Boulahia, N.: Modeling contextual security policies. Int. J. Inf. Secur. 7(4), 285–305 (2007)
Maamar, Z., Benslimane, D., Narendra, N.C.: What can context do for web services? Commun. ACM 49(12), 98–103 (2006)
Mayrhofer, R., Schmidtke, H.R., Sigg, S.: Security and trust in context-aware applications. Pers. Ubiquit. Comput. 18, 115–116 (2012)
Sliman, L., Biennier, F., Badr, Y.: A security policy framework for context-aware and user preferences in e-services. J. Syst. Architect. 55, 275–288 (2009)
Gdańsk University of Technology: My GUT (2013). https://my.pg.gda.pl
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Krawczyk, H., Lubomski, P. (2015). User Trust Levels and Their Impact on System Security and Usability. In: Gaj, P., Kwiecień, A., Stera, P. (eds) Computer Networks. CN 2015. Communications in Computer and Information Science, vol 522. Springer, Cham. https://doi.org/10.1007/978-3-319-19419-6_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-19419-6_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19418-9
Online ISBN: 978-3-319-19419-6
eBook Packages: Computer ScienceComputer Science (R0)