Show simple item record

dc.contributor.authorWernick, Paul
dc.contributor.authorChristianson, Bruce
dc.contributor.authorSpring, William
dc.contributor.editorStajano, F.
dc.contributor.editorAnderson, J.
dc.contributor.editorChristianson, B.
dc.contributor.editorMatyáš, V.
dc.date.accessioned2018-05-11T16:55:49Z
dc.date.available2018-05-11T16:55:49Z
dc.date.issued2017-11-29
dc.identifier.citationWernick , P , Christianson , B & Spring , W 2017 , Simulating Perceptions of Security . in F Stajano , J Anderson , B Christianson & V Matyáš (eds) , Security Protocols XXV : 25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papers . 1 edn , vol. 10476 LNCS , Lecture Notes in Computer Science , Springer International Publishing , pp. 60-68 , Security Protocols 25th International Workshop , Cambridge , United Kingdom , 20/03/17 . https://doi.org/10.1007/978-3-319-71075-4_7
dc.identifier.citationconference
dc.identifier.isbn978-3-319-71074-7
dc.identifier.isbn978-3-319-71075-4
dc.identifier.otherPURE: 12010506
dc.identifier.otherPURE UUID: 9cfb0ebe-fda6-4850-ac72-10ca419a18d9
dc.identifier.otherScopus: 85037867205
dc.identifier.otherORCID: /0000-0002-2251-2838/work/60314456
dc.identifier.urihttp://hdl.handle.net/2299/20033
dc.descriptionThis document is the Accepted Manuscript of a conference paper published in Proceedings of the Cambridge International Workshop on Security Protocols 2017. Under embargo until 29 November 2018. The final publication is available at Springer via: https://doi.org/10.1007/978-3-319-71075-4_7
dc.description.abstractSystems complicated enough to have ongoing security issues are difficult to understand, and hard to model. The models are hard to understand, even when they are right (another reason they are usually wrong), and too complicated to use to make decisions. Instead attackers, developers, and users make security decisions based on their {\em perceptions} of the system, and not on properties that the system actually has. These perceptions differ between communities, causing decisions made by one community to appear irrational to another. Attempting to predict such irrational behaviour by basing a model of perception on a model of the system is even more complicated than the original modelling problem we can't solve. Ockham's razor says to model the perceptions directly, since these will be simpler than the system itself.en
dc.format.extent9
dc.language.isoeng
dc.publisherSpringer International Publishing
dc.relation.ispartofSecurity Protocols XXV
dc.relation.ispartofseriesLecture Notes in Computer Science
dc.rightsEmbargoed
dc.titleSimulating Perceptions of Securityen
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionCentre for Computer Science and Informatics Research
dc.date.embargoedUntil2018-11-29
dc.relation.schoolSchool of Computer Science
dc.description.versiontypeFinal Accepted Version
dcterms.dateAccepted2017-11-29
rioxxterms.versionAM
rioxxterms.versionofrecordhttps://doi.org/10.1007/978-3-319-71075-4_7
rioxxterms.licenseref.startdate2018-11-29
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue
herts.date.embargo2018-11-29
herts.rights.accesstypeEmbargoed


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record