Skip to main content

Enhancing the Security and Usability of Dui Based Collaboration with Proof Based Access Control

  • Chapter
  • First Online:
Distributed User Interfaces: Usability and Collaboration

Abstract

Managing access control (AC) of shared resources is at the heart of any collaboration platform. Thereby, the usability of used AC techniques is crucial for projects with high expectations to fast response times within targeted collaboration processes. In this paper, we address the special case of using the anonymous credential system idemix in a project dealing with distributed user interfaces (DUIs) to enhance decision making in disaster situations. We show the potential of using idemix to enhance the usability of decision making in crisis situations by using DUIs while considering security and privacy. We present this exemplary by means of a developed prototypic collaborative environment, composed by a WallShare based server-side and mobile application for supporting collaborative scenarios within the ReSCUeIT project. Since DUI based collaboration demands wide-support of multiple devices, especially mobile ones, we further present IdeREST, a REST-full idemix integration and idemiX++, the first C++ based implementation of idemix worldwide, to the best of our knowledge. With both we show how to overcome the current gap related to the simultaneous support on non-Java devices such as Windows Phone 7/8 along with performance improvements on Android based platforms when using idemix as an exemplary anonymous credential system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    ReSCUeIT: Robust and secure supply-chain supporting IT. http://www.sichere-warenketten.de

  2. 2.

    di.me: Integrated digital.me Userware. http://www.dime-project.eu

References

  1. Hong, J. I., & Landay, J. A. (2004). An architecture for privacy-sensitive ubiquitous computing. MobiSys’04: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services (pp. 177–189). ACM, New York.

    Google Scholar 

  2. Cranor, L., & Garfinkel, S. (2005). Security and usability. Sebastopol: O’Reilly Media.

    Google Scholar 

  3. Palen, L., & Dourish, P. (2003). Unpacking “privacy” for a networked world. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’03) (pp. 129–136). ACM Press, New York.

    Google Scholar 

  4. Shneiderman, B., Plaisant, C., Cohen, M., & Jacobs, S. (2010). Designing the user interface: Strategies for effective human-computer interaction (5th ed.). Reading: Addison Wesley.

    Google Scholar 

  5. Boyle, M., Neustaedter, C., & Greenberg, S. (2008). Privacy factors in video-based media spaces. In S. Harrision (Ed.), Media space: 20+ years of mediated life (pp. 99–124). Berlin: Springer.

    Google Scholar 

  6. Bullock, A., & Benford, S. (1999). An access control framework for multi-user collaborative environments. Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work. GROUP’99 (pp. 140–149). ACM, New York.

    Google Scholar 

  7. Haake, J. M., Haake, A., Schu ̈mmer, T., Bourimi, M., & Landgraf, B. (2004). End-user controlled group formation and access rights management in a shared workspace system. CSCW’04: Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work (pp. 554–563). ACM Press, Chicago, 6–10 Nov 2004.

    Google Scholar 

  8. Camenisch, J., & Van Herreweghen, E. (2002). Design and implementation of the idemix anonymous credential system. CCS’02: Proceedings of the 9th ACM Conference on Computer and Communications Security (pp. 21–30). ACM, New York.

    Google Scholar 

  9. Bichsel, P., & Camenisch, J. (2010). Mixing identities with ease. In E. De Leeuw, S. Fischer-Hübner, & L. Fritsch (Eds.), IFIP working conference on policies: Research in identity management (IDMAN’10) (pp. 1–17). Springer.

    Google Scholar 

  10. Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., & Smith, J. M. (2010). Smudge attacks on smartphone touch screens. Proceedings of the 4th USENIX Conference on Offensive Technologies. WOOT’10, Berkeley (pp. 1–7). USENIX Association.

    Google Scholar 

  11. Kryszczuk, K., & Drygajlo, A. (2008). Credence estimation and error prediction in biometric identity verification. Signal Processing, 88(4), 916–925.

    Article  MATH  Google Scholar 

  12. Corella, F., & Lewison, K. (2012). Strong and convenient multi-factor authentication on mobiles devices.

    Google Scholar 

  13. Schwarte, P., Bourimi, M., Heupel, M., Kesdogan, D., Gimenez R., Wrobel, S., & Thiel, S. (2013). Multilaterally secure communication anonymity in decentralized social networking. To appear in: Proceedings of the 10th International Conference on Information Technology: New Generations (ITNG), Las Vegas.

    Google Scholar 

  14. Barth, T., Fielenbach, T., Bourimi, M., Kesdogan, D., & Villanueva, P. (2011). Supporting distributed decision making using secure distributed user interfaces. In J. A. Gallud, R. Tesoriero, & V. M. Penichet (Eds.), Distributed user interfaces (Human-computer interaction series, pp. 177–184). London: Springer.

    Chapter  Google Scholar 

  15. Heupel, M. (2010). Porting and evaluating the performance of idemix and tor anonymity on modern smartphones. Master’s thesis, University of Siegen.

    Google Scholar 

  16. Villanueva, P. G., Gallud, J. A., & Tesoriero, R. (2010). WallShare: A multi-pointer system for portable devices. AVI’10: Proceedings of the International Conference on Advanced Visual Interfaces, ACM Request Permissions.

    Google Scholar 

Download references

Acknowledgements

This work has been partially supported by the joint project ReSCUeIT, funded by the German Federal Ministry of Education and Research (BMBF) and the French L’Agence nationale de la recherché (ANR) under grant no. 13N10964. Further support was provided by the EU FP7 project digital.me, funded by the EC (FP7/2007–2013) under grant no. 257787 as well as the Spanish CDTI research project CENIT-2008-1019, the CICYT TIN2011-27767-C02-01 project and the regional projects with reference PPII10-0300-4172 and PIIC09-0185-1030.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marcel Heupel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this chapter

Cite this chapter

Heupel, M., Bourimi, M., Schwarte, P., Kesdogan, D., Barth, T., Villanueva, P.G. (2013). Enhancing the Security and Usability of Dui Based Collaboration with Proof Based Access Control. In: Lozano, M., Gallud, J., Tesoriero, R., Penichet, V. (eds) Distributed User Interfaces: Usability and Collaboration. Human–Computer Interaction Series. Springer, London. https://doi.org/10.1007/978-1-4471-5499-0_8

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-5499-0_8

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-5498-3

  • Online ISBN: 978-1-4471-5499-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics