Adversarial security: Getting to the root of the problem

1Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper revisits the conventional notion of security, and champions a paradigm shift in the way that security should be viewed: we argue that the fundamental notion of security should naturally be one that actively aims for the root of the security problem: the malicious (human-terminated) adversary. To that end, we propose the notion of adversarial security where non-malicious parties and the security mechanism are allowed more activeness; we discuss framework ideas based on factors affecting the (human) adversary, and motivate approaches to designing adversarial security systems. Indeed, while security research has in recent years begun to focus on human elements of the legitimate user as part of the security system's design e.g. the notion of ceremonies; our adversarial security notion approaches general security design by considering the human elements of the malicious adversary. © 2011 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Phan, R. C. W., Whitley, J. N., & Parish, D. J. (2011). Adversarial security: Getting to the root of the problem. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6555 LNCS, pp. 47–55). https://doi.org/10.1007/978-3-642-19228-9_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free