Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1143120acmotherconferencesBook PagePublication PagessoupsConference Proceedingsconference-collections
SOUPS '06: Proceedings of the second symposium on Usable privacy and security
ACM2006 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
Pittsburgh Pennsylvania USA July 12 - 14, 2006
ISBN:
978-1-59593-448-2
Published:
12 July 2006

Reflects downloads up to 09 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

Welcome to the Symposium On Usable Privacy and Security! This is the second installment of what we hope will be an annual event for many years to come. SOUPS 2005 was the first refereed technical conference to bring together an interdisciplinary group of researchers and practitioners in human computer interaction, security, and privacy. Attendees reported that they valued both the formal sessions and the informal interactions they had with other participants. Thus we have tried to develop a program for SOUPS 2006 that builds on the success of SOUPS 2005, including a similar mix of sessions.This year's program features 14 technical papers, a workshop, 23 posters, a panel, three discussion sessions, and an invited talk. We received 39 paper submissions. Each paper was refereed by at least three members of the refereed papers committee, and through an online discussion process the committee selected 14 papers for presentation and publication.A panel and follow-up discussion session on security user studies at SOUPS 2005 provoked so much interest and discussion that SOUPS 2006 features a full day workshop on security user studies. The workshop focuses on the design, implementation and challenges of conducting security user studies. The workshop will be an opportunity for researchers to share experiences, materials, and ideas, and for newcomers to learn about problems and best practices.This year's panel addresses the phishing problem, which has been the focus of much discussion in the media and in technical forums. At SOUPS we will discuss the various approaches that have been proposed to stop or blunt phishing attacks and debate which approach or approaches are most worthy of an investment of time, skill, and money. The program also features an invited talk by Austin Hill that will provide insights on usable security from a corporate perspective.Finally, the SOUPS 2006 program includes three parallel "discussion" sessions, featuring moderated discussion on a topic of interest to attendees. Discussion sessions have been organized around the following topics: "Johnny Can Obfuscate: Beyond Mother's Maiden Name," "Teaching Usable Privacy and Security," and "Policy Management: A Central Theme for Usable Privacy and Security Systems." Other discussion sessions may be added depending on interest. We hope the informal, small group format will lead to lively and productive interactions.

Skip Table Of Content Section
SESSION: Intelligible access control
Article
Aligning usability and security: a usability study of Polaris

Security software is often difficult to use thus leading to poor adoption and degraded security. This paper describes a usability study that was conducted on the software 'Polaris'. This software is an alpha release that uses the Principle of Least ...

Article
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench

Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, our human-centered research has focused on understanding organizational ...

Article
Intentional access management: making access control usable for end-users

The usability of access control mechanisms in modern distributed systems has been widely criticized but little studied. In this paper, we carefully examine one such widely deployed access control mechanism, the one embedded in the WebDAV standard, from ...

SESSION: Password management, mnemonics, and mother's maiden names
Article
Passpet: convenient password management and phishing protection

We describe Passpet, a tool that improves both the convenience and security of website logins through a combination of techniques. Password hashing helps users manage multiple accounts by turning a single memorized password into a different password for ...

Article
Password management strategies for online accounts

Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse their passwords across multiple accounts, they increase their ...

Article
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords

Previous research has found graphical passwords to be more memorable than non-dictionary or "strong" alphanumeric passwords. Participants in a prior study expressed concerns that this increase in memorability could also lead to an increased ...

Article
Human selection of mnemonic phrase-based passwords

Textual passwords are often the only mechanism used to authenticate users of a networked system. Unfortunately, many passwords are easily guessed or cracked. In an attempt to strengthen passwords, some systems instruct users to create mnemonic phrase-...

SESSION: Catching phish
Article
Decision strategies and susceptibility to phishing

Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legitimate source. In order to develop tools that will be effective in combating ...

Article
The methodology and an application to fight against Unicode attacks

Unicode is becoming a dominant character representation format for information processing. This presents a very dangerous usability and security problem for many applications. The problem arises because many characters in the UCS (Universal Character ...

Article
Web wallet: preventing phishing attacks by revealing user intentions

We introduce a new anti-phishing solution, the Web Wallet. The Web Wallet is a browser sidebar which users can use to submit their sensitive information online. It detects phishing attacks by determining where users intend to submit their information ...

SESSION: Risk transparency
Article
Privacy and security threat analysis of the federal employee personal identity verification (PIV) program

This paper is a security and privacy threat analysis of new Federal Information Processing Standard for Personal Identity Verification (FIPS PUB 201). It identifies some problems with the standard, and it proposes solutions to those problems, using ...

Article
Protecting domestic power-line communications

In this paper we describe the protection goals and mechanisms in HomePlug AV, a next-generation power-line communications standard. This is a fascinating case-history in security usability. There are also novel protocol issues; interactions with ...

Article
Power strips, prophylactics, and privacy, oh my!

While Internet users claim to be concerned about online privacy, their behavior rarely reflects those concerns. In this paper we investigate whether the availability of comparison information about the privacy practices of online merchants affects users'...

Article
Seeing further: extending visualization as a basis for usable security

The focus of our approach to the usability considerations of privacy and security has been on providing people with information they can use to understand the implications of their interactions with a system, as well as, to assess whether or not a ...

Contributors
  • Carnegie Mellon University

Recommendations

Acceptance Rates

Overall Acceptance Rate 15 of 49 submissions, 31%
YearSubmittedAcceptedRate
SOUPS '09491531%
Overall491531%