dc.contributor.author | Christianson, B. | |
dc.contributor.editor | Christianson, B. | |
dc.contributor.editor | Malcolm, J. | |
dc.date.accessioned | 2015-02-05T09:33:09Z | |
dc.date.available | 2015-02-05T09:33:09Z | |
dc.date.issued | 2014 | |
dc.identifier.citation | Christianson , B 2014 , Introduction : Virtually perfect security (transcript of discussion) . in B Christianson & J Malcolm (eds) , Security Protocols XVIII . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , vol. 7061 , Springer Nature , pp. 1-2 , 18th International Workshop Security Protocols , Cambridge , United Kingdom , 24/03/10 . https://doi.org/10.1007/978-3-662-45921-8_1 | |
dc.identifier.citation | conference | |
dc.identifier.isbn | 9783662459201 | |
dc.identifier.isbn | 978-3-662-45921-8 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.other | ORCID: /0000-0002-3777-7476/work/76728368 | |
dc.identifier.uri | http://hdl.handle.net/2299/15348 | |
dc.description.abstract | “Virtually Perfect Security” is an attempt to tie together three slightly different interlocking strands. The first is the fact that although we talk about security as if it were some sort of metaphysical property (so that a system is either secure or isn’t), we all know that really whether a system is secure or not depends on the context which you put it, and you can move a system to a different context and change whether it’s secure or not. In practice, we also usually prove security relative to a particular abstraction, and the danger is that we have a system that “really” is secure, and then we discover that the attacker is using a different abstraction. Our attempt to find abstractions which the attacker can’t fool with this trick with has pushed us into talking about security using abstractions that are further and further away from anything that a user might think of as comprehensible or convenient | en |
dc.format.extent | 2 | |
dc.format.extent | 82279 | |
dc.language.iso | eng | |
dc.publisher | Springer Nature | |
dc.relation.ispartof | Security Protocols XVIII | |
dc.relation.ispartofseries | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |
dc.subject | General Computer Science | |
dc.subject | Theoretical Computer Science | |
dc.title | Introduction : Virtually perfect security (transcript of discussion) | en |
dc.contributor.institution | School of Computer Science | |
dc.contributor.institution | Science & Technology Research Institute | |
dc.contributor.institution | Centre for Computer Science and Informatics Research | |
rioxxterms.versionofrecord | 10.1007/978-3-662-45921-8_1 | |
rioxxterms.type | Other | |
herts.preservation.rarelyaccessed | true | |