Human-centred computer security

نویسنده

  • A. W. Roscoe
چکیده

We re-examine the needs of computer security in pervasive computing from first principles, specifically the problem of bootstrapping secure networks. We consider the case of systems that may have no shared secret information, and where there is no structure such as a PKI available. Nevertheless we propose a protocol which achieves a high degree of security based on a combination of humanmediated communication and an ordinary Dolev-Yao communication medium. In particular it resists combinatorial attacks on the hash values that have to be compared by human users, seemingly optimising the amount of security they can achieve for a given amount of work. A variant of this protocol achieves one-sided authentication in a scenario similar to that of authenticating one or more bluetooth devices. We discuss the properties and verification of

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Human-Centred Intelligent Human-Computer Interaction (HCI2): how far are we from attaining it?

A widely accepted prediction is that computing will move to the background, weaving itself into the fabric of our everyday living spaces and projecting the human user into the foreground. To realise this prediction, next-generation computing should develop anticipatory user interfaces that are human-centred, built for humans and based on naturally occurring multimodal human communication. These...

متن کامل

Bridging the gap between human and machine trust : applying methods of user-centred design and usability to computer security

OF DOCTORAL DISSERTATION HELSINKI UNIVERSITY OF TECHNOLOGY P.O. BOX 1000, FI-02015 TKK http://www.tkk.fi

متن کامل

Novel Approches in Image Processing (IP) and Human Centred Systems (HCSs)

The Image Processing (IP) and Human Centred Systems (HCSs) are attractive and current topics of the Computer Science (CS) field. This paper provides methods and algorithms to support these topics in everyday application environments (e.g., entrainment) as well as in specialistic contexts (e.g., rehabilitation). In particular, it is focused on the dissemination of our most recent results obtaine...

متن کامل

HCI in Spain

Human-Computer Interaction field in Spain has experienced a great expansion in the last few years, even if this happened with some delay in comparison with neighbour countries. This paper analyses the reasons for this situation. The efforts made by universities to include Human-Computer Interaction topics in Informatics curricula, and by industry to incorporate usability and human centred desig...

متن کامل

HCI: whose job is it anyway?

A panel of experts on human computer interaction (HCI) argues about who is best placed to ‘own’ HCI and the user centred design process, The experts come from a range of private and public sector organisations, both large (like Microsoft and the NHS) and small (System Concepts). The format of the panel will be loosely based on the popular radio and TV panel game “Whose line is it anyway?”

متن کامل

User Interaction Design for Secure Systems

The security of any computer system that is configured and operated by human beings critically depends on the information conveyed by the user interface, the decisions of the computer users, and the interpretation of their actions. We establish some starting points for reasoning about security from a user-centred point of view, by modelling a system in terms of actors and actions and introducin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006