dc.contributor.author | Wernick, Paul | |
dc.contributor.author | Christianson, Bruce | |
dc.contributor.author | Spring, William | |
dc.contributor.editor | Stajano, F. | |
dc.contributor.editor | Anderson, J. | |
dc.contributor.editor | Christianson, B. | |
dc.contributor.editor | Matyáš, V. | |
dc.date.accessioned | 2018-05-11T16:55:49Z | |
dc.date.available | 2018-05-11T16:55:49Z | |
dc.date.issued | 2017-11-29 | |
dc.identifier.citation | Wernick , P , Christianson , B & Spring , W 2017 , Simulating Perceptions of Security . in F Stajano , J Anderson , B Christianson & V Matyáš (eds) , Security Protocols XXV : 25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papers . 1 edn , vol. 10476 LNCS , Lecture Notes in Computer Science , Springer Nature , pp. 60-68 , Security Protocols 25th International Workshop , Cambridge , United Kingdom , 20/03/17 . https://doi.org/10.1007/978-3-319-71075-4_7 | |
dc.identifier.citation | conference | |
dc.identifier.isbn | 978-3-319-71074-7 | |
dc.identifier.isbn | 978-3-319-71075-4 | |
dc.identifier.other | ORCID: /0000-0002-2251-2838/work/60314456 | |
dc.identifier.other | ORCID: /0000-0002-3777-7476/work/76728387 | |
dc.identifier.uri | http://hdl.handle.net/2299/20033 | |
dc.description | This document is the Accepted Manuscript of a conference paper published in Proceedings of the Cambridge International Workshop on Security Protocols 2017. Under embargo until 29 November 2018. The final publication is available at Springer via: https://doi.org/10.1007/978-3-319-71075-4_7 | |
dc.description.abstract | Systems complicated enough to have ongoing security issues are difficult to understand, and hard to model. The models are hard to understand, even when they are right (another reason they are usually wrong), and too complicated to use to make decisions. Instead attackers, developers, and users make security decisions based on their {\em perceptions} of the system, and not on properties that the system actually has. These perceptions differ between communities, causing decisions made by one community to appear irrational to another. Attempting to predict such irrational behaviour by basing a model of perception on a model of the system is even more complicated than the original modelling problem we can't solve. Ockham's razor says to model the perceptions directly, since these will be simpler than the system itself. | en |
dc.format.extent | 9 | |
dc.format.extent | 704031 | |
dc.language.iso | eng | |
dc.publisher | Springer Nature | |
dc.relation.ispartof | Security Protocols XXV | |
dc.relation.ispartofseries | Lecture Notes in Computer Science | |
dc.title | Simulating Perceptions of Security | en |
dc.contributor.institution | School of Computer Science | |
dc.contributor.institution | Centre for Computer Science and Informatics Research | |
dc.date.embargoedUntil | 2018-11-29 | |
rioxxterms.versionofrecord | 10.1007/978-3-319-71075-4_7 | |
rioxxterms.type | Other | |
herts.preservation.rarelyaccessed | true | |