Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Policy Authoring Matthew Dunlop Usable Security – CS 6204 – Fall, 2009 – Dennis.

Slides:



Advertisements
Similar presentations
Policy Specification, Analysis and Transformation International Technology Alliance in Network and Information Sciences A scenario based demo will illustrate.
Advertisements

Return On Investment Integrated Monitoring and Evaluation Framework.
Planning a measurement program What is a metrics plan? A metrics plan must describe the who, what, where, when, how, and why of metrics. It begins with.
CS 300 – Lecture 22 Intro to Computer Architecture / Assembly Language Virtual Memory.
Analysis Stage (Phase I) The goal: understanding the customer's requirements for a software system. n involves technical staff working with customers n.
© Anselm SpoerriInfo + Web Tech Course Information Technologies Info + Web Tech Course Anselm Spoerri PhD (MIT) Rutgers University
1 CS 430 / INFO 430 Information Retrieval Lecture 24 Usability 2.
CS 290C: Formal Models for Web Software Lecture 6: Model Driven Development for Web Software with WebML Instructor: Tevfik Bultan.
Supplement 02CASE Tools1 Supplement 02 - Case Tools And Franchise Colleges By MANSHA NAWAZ.
Symposium On Usable Privacy and Security Carnegie Mellon University 25 July 2008 Expressions of Expertness The Virtuous Circle of Natural Language for.
Copyright © 2007 Ramez Elmasri and Shamkant B. Navathe Slide 1- 1.
THE BASICS OF THE WEB Davison Web Design. Introduction to the Web Main Ideas The Internet is a worldwide network of hardware. The World Wide Web is part.
Community Planning Training 1-1. Community Plan Implementation Training 1- Community Planning Training 1-3.
Electronic Thesis And Dissertation Database Errors Luke Schmader Ryan Mestre Client: Zhiwu Xie CS4624 5/6/2014.
1 Data Strategy Overview Keith Wilson Session 15.
CSC271 Database Systems Lecture # 20.
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy Preferences Edgardo Vega Usable Security – CS 6204 – Fall, 2009 – Dennis.
Information Retrieval – and projects we have done. Group Members: Aditya Tiwari ( ) Harshit Mittal ( ) Rohit Kumar Saraf ( ) Vinay.
Joel Bapaga on Web Design Strategies Technologies Commercial Value.
PowerPoint Presentation for Dennis, Wixom & Tegarden Systems Analysis and Design Copyright 2001 © John Wiley & Sons, Inc. All rights reserved. Slide 1.
Managing Software Quality
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Design Extensions to Google+ CS6204 Privacy and Security.
1 SWE 513: Software Engineering Usability II. 2 Usability and Cost Good usability may be expensive in hardware or special software development User interface.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Why Johnnys' Network got Owned by Evil Hackers Bent on World Domination and Johnny.
An XPath-based Preference Language for P3P IBM Almaden Research Center Rakesh Agrawal Jerry Kiernan Ramakrishnan Srikant Yirong Xu.
Dan Parish Program Manager Microsoft Session Code: OFC 304.
Sina Keshavaarz M.D Public Health &Preventive Medicine Measuring level of performance & sustaining improvement.
Objectives  Testing Concepts for WebApps  Testing Process  Content Testing  User Interface Testing  Component-level testing  Navigation Testing.
Business Analysis and Essential Competencies
CS 360 Lecture 3.  The software process is a structured set of activities required to develop a software system.  Fundamental Assumption:  Good software.
Melissa Armstrong – Sponsor Dr. Eck Doerry – Mentor Greg Andolshek Alex Koch Michael McCormick Department of Computer Science SolutionProblemDesign User.
Marking Scheme ISM ISM Top-up. Project Contents Abstract, – A one page summary (max. 400 words) of the Intent, work undertaken. Introduction, – An overview.
User Interface Toolkit Mechanisms For Securing Interface Elements Franziska Roesner, James Fogarty, Tadayoshi Kohno Computer Science & Engineering DUB.
A Unifying Approach to the Design of a Secure Database Operating System Written By: David L. Spooner Ehud Gudes.
1 3. Computing System Fundamentals 3.1 Language Translators.
1 Some initial Design suggestions… Getting started… where to begin? Find out whether your design architecture will work… as soon as possible. If you need.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Standards Presented By: David Shelly Usable Security – CS 6204 – Fall,
FORUM II Best Practices in Data Warehousing in Higher Education: A Framework for Higher Education Reporting April 18, 2005 Slide 1 Cornell University’s.
Interpreter CS 124 Reference: Gamma et al (“Gang-of-4”), Design Patterns Some material taken from:
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Information Security What is Information Security?
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Principles of Context aware systems Presented by: Rajesh Gangam Usable Security.
WIRED Week 3 Syllabus Update (next week) Readings Overview - Quick Review of Last Week’s IR Models (if time) - Evaluating IR Systems - Understanding Queries.
1 Standard Student Identification Method Jeanne Saunders Session 16.
Controlling projects: The Management Process
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Using Geographic Information Systems for Enhanced Security Visualization Matthew.
Security Patterns Template and Tutorial - Darrell M. Kienzle, Ph.D., Matthew C. Elder, Ph.D., David S. Tyree, James Edwards-Hewitt Presented by Dan Frohlich.
© 2006 Pearson Addison-Wesley. All rights reserved 2-1 Chapter 2 Principles of Programming & Software Engineering.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Smart, Secure and Sustainable Home: A Socio-Technological Perspective Aleksandr.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Collective Information Practice: Exploring Privacy and Security as Social and Cultural.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Standards Presented By: Matthew Dunlop Usable Security – CS 6204 –
Discussion - HITSC / HITPC Joint Meeting Transport & Security Standards Workgroup October 22, 2014.
Concepts and Realization of a Diagram Editor Generator Based on Hypergraph Transformation Author: Mark Minas Presenter: Song Gu.
Software Development Process CS 360 Lecture 3. Software Process The software process is a structured set of activities required to develop a software.
Lecture 3 Page 1 CS 236 Online Security Mechanisms CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Policy Systems Presented By: John Paul Dunning Usable Security – CS.
Design Evaluation Overview Introduction Model for Interface Design Evaluation Types of Evaluation –Conceptual Design –Usability –Learning Outcome.
XML and Distributed Applications By Quddus Chong Presentation for CS551 – Fall 2001.
TeraGrid’s Process for Meeting User Needs. Jay Boisseau, Texas Advanced Computing Center Dennis Gannon, Indiana University Ralph Roskies, University of.
 System Requirement Specification and System Planning.
Measurement & Data Collection
EI Architecture Overview/Current Assessment/Technical Architecture
The Development Process of Web Applications
1.1 Reasons to study concepts of PLs
Design and Maintenance of Web Applications in J2EE
Continuous Automated Chatbot Testing
Increased Efficiency and Effectiveness
Making Privacy Possible: Research on Organizational Privacy Technology
Presentation transcript:

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Policy Authoring Matthew Dunlop Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Policy Authoring Usable Security and Privacy: A Case Study of Developing Privacy Management Tools (2005) An Empirical Study of Natural Language Parsing of Privacy Policy Using the SPARCLE Policy Workbench (2006) Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Brodie Karat IBM SPARCLE Team

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech What is privacy? The right of an individual to control information about themselves

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Do people care about privacy? In 1999, 78% of people surveyed refused to provide personal information due to concern of misuse In 2000, 50% of people surveyed routinely provide false personal information In 2004, 94% of people surveyed believe the benefit gained does not outweigh the cost of sharing personal information

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Objectives Identify organizational privacy requirements Identify approaches that address privacy requirements Design and validate a prototype for flexible and simple privacy policy creation

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Key privacy design concepts 1. One integrated solution for an organization 2. Privacy functionality separated from application code 3. Support an appropriate level of granularity 4. Work with both structured and unstructured information 5. Simple and flexible privacy functionality

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Abstract privacy architecture

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Integrated solution techniques Creation of a common set of privacy utilities Creation of a single system that acts as a personal information “vault” Not Met Yet

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Separated functionality techniques & techniques for maintaining granularity Hippocratic database Tivoli Privacy Manager Met

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Structured/unstructured info handling & simple and flexible functionality No approaches exist Not Met

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Expanded abstract privacy architecture

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech SPARCLE Server Privacy ARchitecture and CapabiLity Enablement Goals  Create understandable privacy policies  Link written privacy policies with their implementation  Monitor enforcement of policies

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Natural language policy creation

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Structured policy creation

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Viewing privacy policy rules

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Natural language parsing Uses a shallow parser  Identify syntactic structures (e.g. nouns, verbs)  Use grammars to choose desired text based on speech patterns SPARCLE defines five grammars  User categories  Actions  data categories  Purposes  Conditions/obligations

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Natural language parsing example

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Parsing Accuracy Conservative  86% precision  88% recall Liberal  95% precision  97% recall

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Prototype testing Initial 2004 tests of SPARCLE were favorable  High to very high on their seven point scale Improvements after testing:  Import pre-existing privacy policies  Use privacy policy templates as a starting point  Improved readability of the table view

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Implementation testing 2005 implementation tests were mostly favorable  High to very high on their seven point scale Participants were less favorable about pre- processing time  Desire for “no additional work” before inputting rules  Need better language parser

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Subsequent Improvements In 2008, the authors looked at assisting policy authors in writing policies  “Evaluating assistance of natural language policy authoring” (SOUPS 2008) No improvement was made to the language parser Hypothesized that syntax highlighting would improve authoring

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech New Authoring Page

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Why syntax highlighting failed Immediate feedback caused users to stop mid-process to correct mistakes  Interrupted verbalization  Interrupted recording of ideas Recommended fix  Move syntax highlighting to the translation page

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Summary Good Improves on P3P by guaranteeing policy enforcement Provides interface usable by both IT and non-IT professionals Good policy visualization Improve Accuracy of policy parsing Preprocessing time No results on accuracy of machine- translated policies and preventing or granting access

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Discussion Will the overhead of designing policies using SPARCLE discourage its adoption? Will organizations want privacy policies with guaranteed enforcement? Is 86-88% policy translation accuracy okay? What about policies that can’t be defined within the context of SPARCLE?