Layered Analysis of Security Ceremonies. / Bella, Giampaolo; Coles-Kemp, Lizzie.
Information Security and Privacy Research: IFIP Advances in Information and Communication Technology. Vol. 376 Boston : Springer, 2012. p. 273-286.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Layered Analysis of Security Ceremonies. / Bella, Giampaolo; Coles-Kemp, Lizzie.
Information Security and Privacy Research: IFIP Advances in Information and Communication Technology. Vol. 376 Boston : Springer, 2012. p. 273-286.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
}
TY - GEN
T1 - Layered Analysis of Security Ceremonies
AU - Bella, Giampaolo
AU - Coles-Kemp, Lizzie
PY - 2012
Y1 - 2012
N2 - A security ceremony expands a security protocol with every- thing that is considered out of band for it. Notably, it incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks. This makes ceremonies complex and varied, hence the need for their formal analysis aimed at their rigorous understanding.Formal analysis in turn requires clarifying the ceremony structure to build a ceremony model. The model defined here spans over a number of socio-technical layers, ranging from a computer network to society. It inspires a layered analysis of security ceremonies, that is layer by layer. This paper focuses on the human-computer interaction layer, which fea- tures a socio-technical protocol between a user persona and a computer interface. Future work will be to traverse all layers by formal analysis.
AB - A security ceremony expands a security protocol with every- thing that is considered out of band for it. Notably, it incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks. This makes ceremonies complex and varied, hence the need for their formal analysis aimed at their rigorous understanding.Formal analysis in turn requires clarifying the ceremony structure to build a ceremony model. The model defined here spans over a number of socio-technical layers, ranging from a computer network to society. It inspires a layered analysis of security ceremonies, that is layer by layer. This paper focuses on the human-computer interaction layer, which fea- tures a socio-technical protocol between a user persona and a computer interface. Future work will be to traverse all layers by formal analysis.
U2 - 10.1007/978-3-642-30436-1_23
DO - 10.1007/978-3-642-30436-1_23
M3 - Conference contribution
SN - 978-3-642-30435-4
VL - 376
SP - 273
EP - 286
BT - Information Security and Privacy Research
PB - Springer
CY - Boston
ER -