260 likes | 368 Views
This document explores the challenge of incorporating security decisions into the user's workflow without disrupting productivity. Through insights from Alan H. Karp and Marc Stiegler of Hewlett-Packard Laboratories, it addresses the inadequacies of traditional security dialog boxes and the need for clear communication and support for secure practices in everyday tasks. The text introduces SCoopFS, a secure file-sharing solution, and emphasizes principles designed to empower users while maintaining security. It encourages user feedback and aims for a dynamic approach to cross-domain sharing.
E N D
Making Security Decisions Disappear into the User’s Workflow Alan H. Karp and Marc Stiegler Virus Safe Computing Initiative Hewlett-Packard Laboratories
Security Dialog Box Greatest Hits The Real Question: How Do I Get My Work Done?
Let’s Work on This Document Together • Not secure – nobody encrypts email • Inconvenient – Must remember to send changes • Dangerous – No help with edit conflicts
SCoopFS(The F is silent) Simple Secure Cooperative File Sharing
What You Didn’t See No Help Button A crutch for developers No security boxes
Actual User Feedback “This is a nice tool, but it would be better with some security. How do I turn it on?”
But Security Is There https://sha-256-gircxeyeid756z4l.yurl.net:8443/-/mailbox/#s=dmgdue56oc3lqt Encryption – HTTPS Server authentication – domain name User authorization – unguessable fragment
SCoopFS(The F is silent) Secure Simple Secure Cooperative File Sharing
Beyond Engineering Wrote “Not One Click for Security” Realized there might be an underlying principle Stopped to think! (Professional driver on a closed course. Do not attempt.)
Ping’s Ten Principles Make the easy way the least authority way. Use acts of designation to grant authority. Let the user reduce the authority an entity has. Keep the user aware of other’s relevant authorities. Keep the user aware of own authorities. Protect channels that manipulate the user’s authority. Let the user express security in terms that fit the job. Distinguish objects and actions relevant to the task. Use distinguishable, truthful appearances. Indicate clearly the consequences of user actions.
Four Dimensions • Information Needed to make an intelligent decision • Expressiveness Must be able to implement desired policy • Control Need UI controls to inform system • Time When things are done affects user’s perception
Six Degrees of Sharing Dynamic Recomposable Chained Attenuated Accountable Cross Domain
What happens when you block sharing? People work around your barriers.
Four Principles • Uniquely identify every user controllable object • Unique affordance for every decision • Uniquely identify every decision • Unique affordance for every change
Other Applications Share Shell Simple Purse Text Bliki
Can It Be Generalized? For security dialog boxes