​Privacy and Access Control for Non-Security-Experts

Whether sharing files, posting on online social networks, or just browsing the web, users are forced to make more and more decisions that affect their privacy. We investigate and build tools to help.

SC Faculty and Researchers

​Lujo Bauer

Lorrie Cranor

This collection of projects explores architectures, mechanisms, and interfaces for helping users manage access control on online social networks, on the data and files they own, and while browsing the web. We study new technologies to find out where they fall short of meeting users' needs for privacy and control, and we build and test state-of-the-art approaches to help. Recent research includes investigating new ways of specifying access-control policies for physical space and for files (e.g., reactively, and via metadata-based policy rules) and using machine learning to help users specify sharing settings and privacy preferences for online social networks and for web browsing.

Project Publications

(Do not) Track me sometimes: Users' contextual preferences for web tracking. [BibTeXslides]
William Melicher, Mahmood Sharif, Joshua Tan, Lujo Bauer, Mihai Christodorescu, and Pedro Giovanni Leon. Proceedings on Privacy Enhancing Technologies, April 2016. De Gruyter Open. © authors DOI:10.1515/popets-2016-0009

Sharing personal content online: exploring channel choice and multi-channel behaviors. [BibTeXvideo teaser]
Manya Sleeper, William Melicher, Hana Habib, Lujo Bauer, Lorrie Faith Cranor, and Michelle L. Mazurek.
In CHI'16: 34th Annual ACM Conference on Human Factors in Computing Systems, May 2016. ACM. © authors DOI:10.1145/2858036.2858170

Toward strong, usable access control for shared distributed data. [BibTeXtalk video]
Michelle L. Mazurek, Yuan Liang, William Melicher, Manya Sleeper, Lujo Bauer, Gregory R. Ganger, Nitin Gupta, and Michael K. Reiter.
In Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14), February 2014. USENIX.

Challenges faced in working with users to design access-control systems for domestic environments. [BibTeX]
Manya Sleeper, Michelle L. Mazurek and Lujo Bauer.
In Designing with Users for Domestic Environments workshop at CSCW14 (the 17th ACM Conference on Computer Supported Cooperative Work and Social Computing), February 2014. Position paper.

The post anachronism: The temporal dimension of Facebook privacy. [BibTeX]
Lujo Bauer, Lorrie Faith Cranor, Saranga Komanduri, Michelle L. Mazurek, Michael K. Reiter, Manya Sleeper, and Blase Ur.
In Proceedings of the 12th Annual Workshop on Privacy in the Electronic Society, November 2013. ACM. © authors DOI:10.1145/2517840.2517859

What you want is not what you get: Predicting sharing policies for text-based content on Facebook. [BibTeX]
Arunesh Sinha, Yan Li and Lujo Bauer.
In Proceedings of the 6th ACM Workshop on Security and Artificial Intelligence, November 2013. ACM. © authors DOI:10.1145/2517312.2517317

What matters to users? Factors that affect users' willingness to share information with online advertisers. [BibTeX]
Pedro G. Leon, Blase Ur, Yang Wang, Manya Sleeper, Rebecca Balebako, Richard Shay, Lujo Bauer, Mihai Christodorescu, and Lorrie Faith Cranor.
In SOUPS '13: Proceedings of the 9th Symposium on Usable Privacy and Security, July 2013. ACM. © authors DOI:10.1145/2501604.2501611

Out of sight, out of mind: Effects of displaying access-control information near the item it controls. [BibTeX]
Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, and Michael K. Reiter.
In Proceedings of the 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST), pages 128–136, July 2012. IEEE. © IEEE DOI:10.1109/PST.2012.6297929

Tag, you can see it! Using tags for access control in photo sharing. [BibTeX]
Peter F. Klemperer, Yuan Liang, Michelle L. Mazurek, Manya Sleeper, Blase Ur, Lujo Bauer, Lorrie Faith Cranor, Nitin Gupta, and Michael K. Reiter.
In CHI 2012: Conference on Human Factors in Computing Systems, pages 377–386, May 2012. ACM. © ACM DOI:10.1145/2207676.2207728

Exploring reactive access control. [BibTeX]
Michelle L. Mazurek, Peter F. Klemperer, Richard Shay, Hassan Takabi, Lujo Bauer, and Lorrie Faith Cranor.
In CHI '11: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 2085–2094, May 2011. ACM. © ACM DOI:10.1145/1978942.1979245

Access control for home data sharing: Attitudes, needs and practices. [BibTeX]
Michelle L. Mazurek, J.P. Arsenault, Joanna Breese, Nitin Gupta, Iulia Ion, Christina Johns, Daniel Lee, Yuan Liang, Jenny Olsen, Brandon Salmon, Richard Shay, Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Gregory R. Ganger, and Michael K. Reiter.
In CHI 2010: Conference on Human Factors in Computing Systems, pages 645–654, April 2010. ACM. © ACM DOI:10.1145/1753326.1753421

  • Related Research ​Personalized Privacy Assistant Read More
  • Related Research ​Usable and Secure Passwords Read More