Skip to main content

User Trust Levels and Their Impact on System Security and Usability

  • Conference paper
  • First Online:
Computer Networks (CN 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 522))

Included in the following conference series:

Abstract

A multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Krawczyk, H., Lubomski, P.: CoRBAC - kontekstowo zorientowany model bezpieczeństwa. Stud. Informatica 34(3), 185–194 (2013). (in polish)

    Google Scholar 

  2. Bursztein, E., Martin, M., Mitchell, J.: Text-based CAPTCHA strengths and weaknesses. In: Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS 2011, vol. 2011, p. 125. ACM Press, New York (2011)

    Google Scholar 

  3. Lubomski, P.: Context in security of distributed e-service environments. In: Proceedings of the Chip to Cloud Security Forum 2014, Marseille, France (2014)

    Google Scholar 

  4. Stanton, J.M., Stam, K.R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviors. Comput. Secur. 24(2), 124–133 (2005)

    Article  Google Scholar 

  5. Balcerek, B., Frankowski, G., Kwiecień, A., Meyer, N., Nowak, M., Smutnicki, A.: Multilayered IT security requirements and measures for the complex protection of polish domain-specific grid infrastructure. In: Bubak, M., Kitowski, J., Wiatr, K. (eds.) PLGrid Plus. LNCS, vol. 8500, pp. 61–79. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  6. Pahnila, S.P.S., Siponen, M.S.M., Mahmood, A.M.A.: Employees’ behavior towards IS security policy compliance. In: 2007 40th Annual Hawaii International Conference on System Sciences (HICSS 2007) (2007)

    Google Scholar 

  7. Furnell, S.: Usability versus complexity – striking the balance in end-user security. Netw. Secur. 12, 13–17 (2010)

    Article  Google Scholar 

  8. Crawford, H., Renaud, K.: Understanding user perceptions of transparent authentication on a mobile device. J. Trust Manage. 1, 1–7 (2014)

    Article  Google Scholar 

  9. Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J., Moody, K.: Using trust and risk in role-based access control policies. In: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies - SACMAT 2004, p. 156. ACM Press, New York (2004)

    Google Scholar 

  10. DeLone, W.H., McLean, E.R.: Information systems success: the quest for the dependent variable. Inf. Syst. Res. 3(1), 60–95 (1992)

    Article  Google Scholar 

  11. Cuppens, F., Cuppens-Boulahia, N.: Modeling contextual security policies. Int. J. Inf. Secur. 7(4), 285–305 (2007)

    Article  Google Scholar 

  12. Maamar, Z., Benslimane, D., Narendra, N.C.: What can context do for web services? Commun. ACM 49(12), 98–103 (2006)

    Article  Google Scholar 

  13. Mayrhofer, R., Schmidtke, H.R., Sigg, S.: Security and trust in context-aware applications. Pers. Ubiquit. Comput. 18, 115–116 (2012)

    Article  Google Scholar 

  14. Sliman, L., Biennier, F., Badr, Y.: A security policy framework for context-aware and user preferences in e-services. J. Syst. Architect. 55, 275–288 (2009)

    Article  Google Scholar 

  15. Gdańsk University of Technology: My GUT (2013). https://my.pg.gda.pl

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paweł Lubomski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Krawczyk, H., Lubomski, P. (2015). User Trust Levels and Their Impact on System Security and Usability. In: Gaj, P., Kwiecień, A., Stera, P. (eds) Computer Networks. CN 2015. Communications in Computer and Information Science, vol 522. Springer, Cham. https://doi.org/10.1007/978-3-319-19419-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19419-6_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19418-9

  • Online ISBN: 978-3-319-19419-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics