安全系统的用户界面设计

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

UserInteractionDesignforSecureSystemsKa-PingYee@zesty.caAbstract.Thesecurityofanycomputersystemthatiscon guredorop-eratedbyhumanbeingscriticallydependsontheinformationconveyedbytheuserinterface,thedecisionsoftheusers,andtheinterpretationoftheiractions.Thispaperestablishessomestartingpointsforreasoningaboutsecurityfromauser-centredpointofview:itproposestomodelsystemsintermsofactorsandactions,andintroducestheconceptofthesubjectiveactor-abilitystate.Tenkeyprinciplesforsecureinteractiondesignareidenti ed;casestudiesillustrateandjustifytheprinciples,describingreal-worldproblemsandpossiblesolutions.Itishopedthatthisworkwillhelpguidethedesignandevaluationofsecuresystems.1IntroductionSecurityproblemsareoftenattributedtosoftwareerrorssuchasbu eroverruns,raceconditions,orweakcryptosystems.Thishasfocusedagreatdealofattentiononassuringthecorrectnessofsoftwareimplementations.However,thecorrectuseofsoftwareisjustasimportantasthecorrectnessofthesoftwareitself.Forexample,thereisnothinginherentlyincorrectaboutaprogramthatdeletes les.Butwhensuchaprogramhappenstodelete lesagainstourwishes,weperceiveasecurityviolation.Inadi erentsituation,theinabilitytocommandtheprogramtodelete lescouldalsobeaserioussecurityproblem.Itfollowsthatthesecuritypropertiesofanysystemcanonlybemeaningfullydiscussedinthecontextofthesystem'sexpectedbehaviour.Gar nkelandSpa ordgivethede nition:\Acomputerissecureifyoucandependonitanditssoftwaretobehaveasyouexpect[7].Noticethatthisde nitionisnecessarilydependentonthemeaningof\you,whichusuallyreferstotheuser.Itisimpossibletoevendescribesecuritywithoutaddressingtheuserperspective.Amongthemostspectacularofrecentsecurityproblemsaree-mailattach-mentviruses.Manyofthesearegoodreal-lifeexamplesofsecurityviolationsintheabsenceofsoftwareerrors:atnopointintheirpropagationdoesanyapplicationorsystemsoftwarebehavedi erentlythanitsprogrammerswouldexpect.Thee-mailclientcorrectlydisplaysthemessageandcorrectlydecodestheattachment;thesystemcorrectlyexecutesthevirusprogramwhentheuseropenstheattachment.Rather,theproblemexistsbecausethefunctionallycorrectbehaviourisinconsistentwithwhattheuserwouldwant.Thispaperaimstomaketwomaincontributions: rst,itpresentsamodeltoguidethinkingaboutthistypeofissue;andsecond,itgivesspeci crecom-mendationsintheformofteninteractiondesignprinciplesforsecuresystems.Manydesignershabituallyassumethatimprovingsecuritynecessarilyde-gradesusability,andviceversa;thedecisionofwhethertofavouroneortheotheristypicallyseenasaregrettablecompromise.Forexample,acommonlysuggestedsecurity xistohavethecomputeraskforusercon rmation,yetwearealsooftenwarnedagainstannoyingtheuserbyaskingtoofrequently[14].Intheend,thesejudgementcallsareoftenmadearbitrarilybecausethereseemstobenogoodanswer.Acoherentmodelforsecureuserinteractioncanclarifythedesignprocessandhelpdesignersmakethesedecisionsconsistently.Itaketheapparentlyradicalpositionthatsecurityandusabilityarenotfundamentallyatoddswitheachother.Infact,itshouldbecomeclearuponreflectionthattheoppositemakesmoresense:asystemthatismoresecureismorecontrollable,morereliable,andhencemoreusable;amoreusablesystemreducesconfusionandisthusmorelikelytobesecure.Ingeneral,securityadvocatesandusabilityadvocatesbothwantthecomputertocorrectlydowhattheuserwants{nomoreandnoless1.Theresultspresentedherecomefromdiscussingdesignchallengesanduserexperiencesatlengthwithdesignersandusersofsoftwareintendedtobesecure.Aftermuchdebateandseveraliterationsofre nement,wehavetriedtodistillthemostproductivelinesofreasoningdowntoaconcisesetofdesignprinciplesthatcoversmanyoftheimportantandcommonfailuremodes.2RelatedWorkThereseemtoberelativelyfewdevelopmente ortsincomputersecurity[10][12][25]thathaveseriouslyemphasizeduserinteractionissues.TheAdageproject[25],auser-centredauthorizationservice,isprobablythelargestsuche orttodate.Therehavebeenseveralimportantusabilitystudiesofsecurityapplications[1][13][16][24],allofwhichhaveshownthedevastatingimpactthatignoringusabilityissuescanhaveonthee ectivenessofsecuritymeasures.Tomyknowledge,thispaperisthe rstattempttoproposeastructuredframeworkfordesignthinkingandtosuggestwidelyapplicableguidelinesforsecureinteractiondesignasopposedtostudyingasingleapplicationormechanism.Simultaneouslyaddressingalltenofthedesignprinciplespresentedhereisadmittedlyasigni cantdesignchallenge.Lesttheyseemtooidealistictobesatis ablebyarealsystem,itisworthmentioningthatthereisanindependentlydevelopedworkingprototypeofasecuredesktopenvironment[3]thatlargelysucceedsinsatisfyingmostoftheprinciples.1Oftenadilemmastemsfromconflictsbetweenwhatdi erentpeoplewant.Forexample,somedigitalrightsmanagemente ortscurrentlyunderwaywouldmakemediacontenthardertouse.Theyaredescribedassecurityimprovements,buttheresultingconflictisnotoneofsecurityversususability:itisactuallyaconflictbetweenthedesiresofusersandcontentdistributors.Balancingsuchconflictsisindeedanimportantproblem,butitisoutsideofthescopeofthispaper.Althoughwewillnotaddressthedesignofsystemsthatservetwomasters,understandinghowtoserveon

1 / 21
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功