This panel discusses specific challenges in the usability of access control technologies and new opportunities for research. The questions vary from “Why nobody, even experts, uses access control lists (ACLs)?” to “Shall access controls (and corresponding languages) be totally embedded and invisible and never, ever seen by the users?” to “What should be the user-study methodology for access control systems?”. Categories and Subject Descriptors D.4.6 [Operating Systems]: Security and Protection—Ac