Show simple item record

dc.contributor.authorChowdhury, Partha Das
dc.contributor.authorChristianson, B.
dc.contributor.editorChristianson, B.
dc.contributor.editorMalcolm, J.
dc.date.accessioned2015-02-05T09:33:08Z
dc.date.available2015-02-05T09:33:08Z
dc.date.issued2014
dc.identifier.citationChowdhury , P D & Christianson , B 2014 , More security or less insecurity . in B Christianson & J Malcolm (eds) , Security Protocols XVIII . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , vol. 7061 , Springer Nature , pp. 115-119 , 18th International Workshop Security Protocols , Cambridge , United Kingdom , 24/03/10 . https://doi.org/10.1007/978-3-662-45921-8_18
dc.identifier.citationconference
dc.identifier.isbn9783662459201
dc.identifier.isbn978-3-662-45921-8
dc.identifier.issn0302-9743
dc.identifier.otherPURE: 8047513
dc.identifier.otherPURE UUID: a0b048af-d65a-4929-8e88-8d9d943dadf8
dc.identifier.otherScopus: 84915781222
dc.identifier.urihttp://hdl.handle.net/2299/15347
dc.description.abstractWe depart from the conventional quest for ‘Completely Secure Systems’ and ask ‘How can we be more Secure’. We draw heavily from the evolution of the Theory of Justice and the arguments against the institutional approach to Justice. Central to our argument is the identification of redressable insecurity, or weak links. Our contention is that secure systems engineering is not really about building perfectly secure systems but about redressing manifest insecurities.en
dc.format.extent5
dc.language.isoeng
dc.publisherSpringer Nature
dc.relation.ispartofSecurity Protocols XVIII
dc.relation.ispartofseriesLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
dc.subjectComputer Science(all)
dc.subjectTheoretical Computer Science
dc.titleMore security or less insecurityen
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionScience & Technology Research Institute
dc.contributor.institutionCentre for Computer Science and Informatics Research
rioxxterms.versionAM
rioxxterms.versionofrecordhttps://doi.org/10.1007/978-3-662-45921-8_18
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record