Show simple item record

dc.contributor.authorChristianson, B.
dc.contributor.editorChristianson, B.
dc.contributor.editorMalcolm, J.
dc.date.accessioned2015-02-05T09:33:09Z
dc.date.available2015-02-05T09:33:09Z
dc.date.issued2014
dc.identifier.citationChristianson , B 2014 , Introduction : Virtually perfect security (transcript of discussion) . in B Christianson & J Malcolm (eds) , Security Protocols XVIII . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , vol. 7061 , Springer Nature , pp. 1-2 , 18th International Workshop Security Protocols , Cambridge , United Kingdom , 24/03/10 . https://doi.org/10.1007/978-3-662-45921-8_1
dc.identifier.citationconference
dc.identifier.isbn9783662459201
dc.identifier.isbn978-3-662-45921-8
dc.identifier.issn0302-9743
dc.identifier.otherORCID: /0000-0002-3777-7476/work/76728368
dc.identifier.urihttp://hdl.handle.net/2299/15348
dc.description.abstract“Virtually Perfect Security” is an attempt to tie together three slightly different interlocking strands. The first is the fact that although we talk about security as if it were some sort of metaphysical property (so that a system is either secure or isn’t), we all know that really whether a system is secure or not depends on the context which you put it, and you can move a system to a different context and change whether it’s secure or not. In practice, we also usually prove security relative to a particular abstraction, and the danger is that we have a system that “really” is secure, and then we discover that the attacker is using a different abstraction. Our attempt to find abstractions which the attacker can’t fool with this trick with has pushed us into talking about security using abstractions that are further and further away from anything that a user might think of as comprehensible or convenienten
dc.format.extent2
dc.format.extent82279
dc.language.isoeng
dc.publisherSpringer Nature
dc.relation.ispartofSecurity Protocols XVIII
dc.relation.ispartofseriesLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
dc.subjectGeneral Computer Science
dc.subjectTheoretical Computer Science
dc.titleIntroduction : Virtually perfect security (transcript of discussion)en
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionScience & Technology Research Institute
dc.contributor.institutionCentre for Computer Science and Informatics Research
rioxxterms.versionofrecord10.1007/978-3-662-45921-8_1
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record