Computing Science Group CS-RR-10-01

نویسندگان

  • Hyoungshick Kim
  • Jun Ho Huh
  • Ross Anderson
چکیده

South Korean Internet banking systems have a unique way of enforcing security controls. Users are obliged to install proprietary security software – typically an ActiveX plugin that implements a bundle of protection mechanisms in the user’s browser. The banks and their software suppliers claim that this provides trustworthy user platforms. One side-effect is that almost everyone in Korea uses IE rather than other browsers. We conducted a survey of bank customers who use both Korean and other banking services, and found that the Korean banks’ proprietary mechanisms impose significant usability penalties. Usability here is strongly correlated with compatability: Korean users have become stuck in an isolated backwater, and have not benefited from all the advances in mainstream browser and security technology. The proprietary mechanisms fail to provide a trustworthy platform; what’s more, alternative strategies based on trustworthy computing techniques are quite likely to suffer from the same usability problems. We conclude that transaction authentication may be the least bad of the available options.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computing Science Group CS-RR-10-04

We present a method for automatically creating large-scale semantic networks from natural language text, based on deep semantic analysis. We provide a robust and scalable implementation, and sketch various ways in which the representation may be deployed for conceptual knowledge acquisition. A translation to RDF establishes interoperability with a wide range of standardised tools, and bridges t...

متن کامل

A Group based Time Quantum Round Robin Algorithm using Min-Max Spread Measure

Round Robin (RR) Scheduling is the basis of time sharing environment. It is the combination of First Come First Served (FCFS) scheduling algorithm and preemption among processes. It is basically used in a time sharing operating system. It switches from one process to another process in a time interval. The time interval or Time Quantum (TQ) is fixed for all available processes. So, the larger p...

متن کامل

Efficiently Decodable Non-Adaptive Threshold Group Testing

X iv :1 71 2. 07 50 9v 2 [ cs .I T ] 2 3 D ec 2 01 7 Efficiently Decodable Non-Adaptive Threshold Group Testing Thach V. Bui∗, Minoru Kuribayashi‡, Mahdi Cheraghchi§, and Isao Echizen∗† ∗SOKENDAI (The Graduate University for Advanced Studies), Hayama, Kanagawa, Japan [email protected] ‡Graduate School of Natural Science and Technology, Okayama University, Okayama, Japan [email protected] ...

متن کامل

Representation of $H$-closed monoreflections in archimedean $ell$-groups with weak unit

 The category of the title is called $mathcal{W}$. This has all free objects $F(I)$ ($I$ a set). For an object class $mathcal{A}$, $Hmathcal{A}$ consists of all homomorphic images of $mathcal{A}$-objects. This note continues the study of the $H$-closed monoreflections $(mathcal{R}, r)$ (meaning $Hmathcal{R} = mathcal{R}$), about which we show ({em inter alia}): $A in mathcal{A}$ if and  only if...

متن کامل

Dopamine versus norepinephrine in the treatment of cardiogenic shock

BACKGROUND Guidelines recommend that norepinephrine (NA) should be used to reach the target mean arterial pressure (MAP) during cardiogenic shock (CS), rather than epinephrine and dopamine (DA). However, there has actually been few studies on comparing norepinephrine with dopamine and their results conflicts. These studies raise a heat discussion. This study aimed to validate the effectiveness ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010