Layered Analysis of Security Ceremonies. / Bella, Giampaolo; Coles-Kemp, Lizzie.

Information Security and Privacy Research: IFIP Advances in Information and Communication Technology. Vol. 376 Boston : Springer, 2012. p. 273-286.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

Layered Analysis of Security Ceremonies. / Bella, Giampaolo; Coles-Kemp, Lizzie.

Information Security and Privacy Research: IFIP Advances in Information and Communication Technology. Vol. 376 Boston : Springer, 2012. p. 273-286.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Bella, G & Coles-Kemp, L 2012, Layered Analysis of Security Ceremonies. in Information Security and Privacy Research: IFIP Advances in Information and Communication Technology. vol. 376, Springer, Boston, pp. 273-286. https://doi.org/10.1007/978-3-642-30436-1_23

APA

Bella, G., & Coles-Kemp, L. (2012). Layered Analysis of Security Ceremonies. In Information Security and Privacy Research: IFIP Advances in Information and Communication Technology (Vol. 376, pp. 273-286). Springer. https://doi.org/10.1007/978-3-642-30436-1_23

Vancouver

Bella G, Coles-Kemp L. Layered Analysis of Security Ceremonies. In Information Security and Privacy Research: IFIP Advances in Information and Communication Technology. Vol. 376. Boston: Springer. 2012. p. 273-286 https://doi.org/10.1007/978-3-642-30436-1_23

Author

Bella, Giampaolo ; Coles-Kemp, Lizzie. / Layered Analysis of Security Ceremonies. Information Security and Privacy Research: IFIP Advances in Information and Communication Technology. Vol. 376 Boston : Springer, 2012. pp. 273-286

BibTeX

@inproceedings{f77902399a1f4b609ae6635e4c28b793,
title = "Layered Analysis of Security Ceremonies",
abstract = "A security ceremony expands a security protocol with every- thing that is considered out of band for it. Notably, it incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks. This makes ceremonies complex and varied, hence the need for their formal analysis aimed at their rigorous understanding.Formal analysis in turn requires clarifying the ceremony structure to build a ceremony model. The model defined here spans over a number of socio-technical layers, ranging from a computer network to society. It inspires a layered analysis of security ceremonies, that is layer by layer. This paper focuses on the human-computer interaction layer, which fea- tures a socio-technical protocol between a user persona and a computer interface. Future work will be to traverse all layers by formal analysis.",
author = "Giampaolo Bella and Lizzie Coles-Kemp",
year = "2012",
doi = "10.1007/978-3-642-30436-1_23",
language = "English",
isbn = "978-3-642-30435-4",
volume = "376",
pages = "273--286",
booktitle = "Information Security and Privacy Research",
publisher = "Springer",

}

RIS

TY - GEN

T1 - Layered Analysis of Security Ceremonies

AU - Bella, Giampaolo

AU - Coles-Kemp, Lizzie

PY - 2012

Y1 - 2012

N2 - A security ceremony expands a security protocol with every- thing that is considered out of band for it. Notably, it incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks. This makes ceremonies complex and varied, hence the need for their formal analysis aimed at their rigorous understanding.Formal analysis in turn requires clarifying the ceremony structure to build a ceremony model. The model defined here spans over a number of socio-technical layers, ranging from a computer network to society. It inspires a layered analysis of security ceremonies, that is layer by layer. This paper focuses on the human-computer interaction layer, which fea- tures a socio-technical protocol between a user persona and a computer interface. Future work will be to traverse all layers by formal analysis.

AB - A security ceremony expands a security protocol with every- thing that is considered out of band for it. Notably, it incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks. This makes ceremonies complex and varied, hence the need for their formal analysis aimed at their rigorous understanding.Formal analysis in turn requires clarifying the ceremony structure to build a ceremony model. The model defined here spans over a number of socio-technical layers, ranging from a computer network to society. It inspires a layered analysis of security ceremonies, that is layer by layer. This paper focuses on the human-computer interaction layer, which fea- tures a socio-technical protocol between a user persona and a computer interface. Future work will be to traverse all layers by formal analysis.

U2 - 10.1007/978-3-642-30436-1_23

DO - 10.1007/978-3-642-30436-1_23

M3 - Conference contribution

SN - 978-3-642-30435-4

VL - 376

SP - 273

EP - 286

BT - Information Security and Privacy Research

PB - Springer

CY - Boston

ER -