Layered analysis of security ceremonies

40Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

A security ceremony expands a security protocol with everything that is considered out of band for it. Notably, it incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks. This makes ceremonies complex and varied, hence the need for their formal analysis aimed at their rigorous understanding. Formal analysis in turn requires clarifying the ceremony structure to build a ceremony model. The model defined here spans over a number of socio-technical layers, ranging from a computer network to society. It inspires a layered analysis of security ceremonies, that is layer by layer. This paper focuses on the human-computer interaction layer, which features a socio-technical protocol between a user persona and a computer interface. Future work will be to traverse all layers by formal analysis. © 2012 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Bella, G., & Coles-Kemp, L. (2012). Layered analysis of security ceremonies. In IFIP Advances in Information and Communication Technology (Vol. 376 AICT, pp. 273–286). https://doi.org/10.1007/978-3-642-30436-1_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free