WEKO3
アイテム
Helping Johnny to Search: Usable Encrypted Search on Webmail System
https://ipsj.ixsq.nii.ac.jp/records/201525
https://ipsj.ixsq.nii.ac.jp/records/20152514cec6f0-24b6-48de-9fa1-361cd32f1eff
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
Copyright (c) 2019 by the Information Processing Society of Japan
|
|
オープンアクセス |
Item type | Journal(1) | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
公開日 | 2019-12-15 | |||||||||||
タイトル | ||||||||||||
タイトル | Helping Johnny to Search: Usable Encrypted Search on Webmail System | |||||||||||
タイトル | ||||||||||||
言語 | en | |||||||||||
タイトル | Helping Johnny to Search: Usable Encrypted Search on Webmail System | |||||||||||
言語 | ||||||||||||
言語 | eng | |||||||||||
キーワード | ||||||||||||
主題Scheme | Other | |||||||||||
主題 | [特集:ユーザブルセキュリティ] usable security, e-mail encryption, searchable encryption, encrypted search | |||||||||||
資源タイプ | ||||||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||||
資源タイプ | journal article | |||||||||||
著者所属 | ||||||||||||
Toho University | ||||||||||||
著者所属 | ||||||||||||
Toho University | ||||||||||||
著者所属 | ||||||||||||
Toho University | ||||||||||||
著者所属(英) | ||||||||||||
en | ||||||||||||
Toho University | ||||||||||||
著者所属(英) | ||||||||||||
en | ||||||||||||
Toho University | ||||||||||||
著者所属(英) | ||||||||||||
en | ||||||||||||
Toho University | ||||||||||||
著者名 |
Tatsuya, Midorikawa
× Tatsuya, Midorikawa
× Akihiro, Tachikawa
× Akira, Kanaoka
|
|||||||||||
著者名(英) |
Tatsuya, Midorikawa
× Tatsuya, Midorikawa
× Akihiro, Tachikawa
× Akira, Kanaoka
|
|||||||||||
論文抄録 | ||||||||||||
内容記述タイプ | Other | |||||||||||
内容記述 | End-to-end encryption is becoming common in messaging applications. E-mail that is the one of most popular a messaging application has several standards and systems in its encryption. However, it is hard to say that e-mail encryption has spread enough. It has been pointed out that there are usability problems in message encryption. Even though various studies on message encryption and usability have been made, there is no study discussing utility function such as searching and sorting. In this paper, the search function is focused. We aim to investigate the usability problems on encrypted search. Therefore, a method that applies encrypted search transparently is proposed at first. The implementation of the proposed method is achieved using Google Chrome Extension for Gmail, and evaluation both performance and usability is conducted. We found that participants do not mind whether the search function is encrypted or not if both have almost identical UI and encrypted search operates at high speed. ------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.27(2019) (online) DOI http://dx.doi.org/10.2197/ipsjjip.27.763 ------------------------------ |
|||||||||||
論文抄録(英) | ||||||||||||
内容記述タイプ | Other | |||||||||||
内容記述 | End-to-end encryption is becoming common in messaging applications. E-mail that is the one of most popular a messaging application has several standards and systems in its encryption. However, it is hard to say that e-mail encryption has spread enough. It has been pointed out that there are usability problems in message encryption. Even though various studies on message encryption and usability have been made, there is no study discussing utility function such as searching and sorting. In this paper, the search function is focused. We aim to investigate the usability problems on encrypted search. Therefore, a method that applies encrypted search transparently is proposed at first. The implementation of the proposed method is achieved using Google Chrome Extension for Gmail, and evaluation both performance and usability is conducted. We found that participants do not mind whether the search function is encrypted or not if both have almost identical UI and encrypted search operates at high speed. ------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.27(2019) (online) DOI http://dx.doi.org/10.2197/ipsjjip.27.763 ------------------------------ |
|||||||||||
書誌レコードID | ||||||||||||
収録物識別子タイプ | NCID | |||||||||||
収録物識別子 | AN00116647 | |||||||||||
書誌情報 |
情報処理学会論文誌 巻 60, 号 12, 発行日 2019-12-15 |
|||||||||||
ISSN | ||||||||||||
収録物識別子タイプ | ISSN | |||||||||||
収録物識別子 | 1882-7764 |