Seeing the full picture: The case for extending security ceremony analysis

Giampaolo Bella, Lizzie Coles-Kemp

Research output: Chapter in Book/Report/Conference proceedingConference contribution


he concept of the security ceremony was introduced a few years ago to complement the concept of the security protocol with everything about the context in which a protocol is run. In particular, such context involves the human executors of a protocol. When including human actors, human protocols become the focus, hence the concept of the security ceremony can be seen as part of the domain of socio-technical studies. This paper addresses the problem of ceremony analysis lacking the full view of human protocols. This paper categorises existing security ceremony analysis work and illustrates how the ceremony picture could be extended to support a more comprehensive analysis. The paper explores recent weaknesses found on the Amazon's web interface to illustrate different approaches to the analysis of the full ceremony picture.
Original languageEnglish
Title of host publicationProceedings of 9th Australian Information Security Management Conference
Number of pages6
ISBN (Electronic)ISBN 978-0-7298-0698-5
Publication statusPublished - 2011

Cite this