skip to main content
10.1145/508171.508178acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article

Safe and sound: a safety-critical approach to security

Published:10 September 2001Publication History

ABSTRACT

This paper firstly argues that the design of security applications needs to consider more than technical elements. Since almost all security systems involve human users as well as technology, security should be considered, and designed as, a socio-technical work system. Secondly, we argue that safety-critical systems design has similar goals and issues to security design, and should thus provide a good starting point. Thirdly, we identify Reason's (1990) Generic Error Modeling System/Basic Elements of Production as the most suitable starting point for a socio-technical approach, and demonstrate how its basic elements can be applied to the domain of information security. We demonstrate how the application of the model's concepts, especially the distinction between active and latent failures, offers an effective way of identifying and addressing security issues that involve human behavior. Finally, we identify strengths and weaknesses of this approach, and the requirement for further work to produce a security-specific socio-technical design framework.

References

  1. Adams, A. and Sasse, M. A. (1999), Users are not the enemy, Communications of the ACM, Vol. 42, No. 12. December, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Anderson, R. (2001) Security Engineering. John Wiley and Sons; UK.Google ScholarGoogle Scholar
  3. Baker, D. B. (1996) Fortresses Built Upon Sand. in Proceedings of the 1996 New Security Paradigms Workshop. Arrowhead, CA.: ACM Press https://www.acm.org/pubs/articles/proceedings/commsec/304851/p148-baker/p148-baker.pdf Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bell, D., & LaPadula, L. (1973) Secure Computer Systems: Mathematical Foundations and Model, M74-244, MITRE Corp. Bedford, MA,Google ScholarGoogle Scholar
  5. Biba, K. (1977) Integrity Constraints for Secure Computer Systems. Tech. Rep. ESD-TR76-372, USAF Electronic Systems Division, Bedford, MAGoogle ScholarGoogle Scholar
  6. Brostoff, S. & Sasse, M. A. (2000): Are Passfaces more usable than passwords? A field trial investigation. In S. McDonald, Y. Waern & G. Cockton {Eds.}: People and Computers XIV - Usability or Else! Proceedings of HCI 2000 (September 5th - 8th, Sunderland, UK), pp. 405-424. SpringerGoogle ScholarGoogle Scholar
  7. Bunnell, J., Podd, J., Henderson, R., Napier, R., & Kennedy-Moffat, J. (1997). Cognitive, associative and conventional passwords: Recall and guessing rates. Computers and Security, 16(7), 629-641.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Clark, D. &. Wilson, D. (1987) A Comparison of Commercial and Military Computer Security Policies. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA.Google ScholarGoogle Scholar
  9. Dobson, J. (1993) new security paradigms: what other concepts do we need as well? Proceedings of the 1993 workshop on new security paradigms. August 225, 1993, Little Compton, RI. http://www.acm.org/pubs/contents/proceedings/commsec/283751/ Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. FIPS (1985) Password Usage. Federal Information Processing Standards Publication. May 30.Google ScholarGoogle Scholar
  11. Haskett, J. A. (1984). Pass-algorithms: a user validation scheme based on than knowledge of secret algorithms. Communications of the ACM, 27(8), 777-781. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hudson, P. T. W. (1988) Personal communication, In Reason, J. (1990) Human Error. Cambridge University Press. Cambridge, UKGoogle ScholarGoogle Scholar
  13. Jermyn, I., Mayer, A., Monrose, F., Reiter, M. K., Rubin, A. D. (1999) The Design and Analysis of Graphical Passwords. Proceedings of the 8th USENIX Security Symposium, August 23-36, 1999, Washington, D.C., USA Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. LaPadula, J., (1993) Prospect on security paradigms. Proceedings of the 1993 workshop on new security paradigms. August 225, 1993, Little Compton, RI. http://www.acm.org/pubs/contents/proceedings/commsec/283751/ Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Lemos, R (2000) Laptop thieves usually not after data. http://www.zdnet.com/zdnn/stories/news/0,4586,2629471,00.htmlGoogle ScholarGoogle Scholar
  16. Lipson, D. A. and Fisher, H. F. (1999) Survivability-a new technical and business perspective on security. New security paradigms workshop. Proceedings of the 1999 workshop on new security paradigms, September 22 to 24, 1999, Caledonian hills Canada Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Murrer, E. (1999). Fingerprint Authentication. Secure Computing(March), 26-30.Google ScholarGoogle Scholar
  18. Menkus, B. (1988). Understanding the use of passwords. Computers and Security, 7(2), 132-136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Poulsen, K. (2000): Mitnick to lawmakers; People, phones and weakest links, http://www.politechbot.com/p-00969.html.Google ScholarGoogle Scholar
  20. Reason, J. (1990) Human Error. Cambridge University Press. Cambridge, UKGoogle ScholarGoogle Scholar
  21. Sasse, M. A., Brostoff, S. & Weirich, D. (2001), Transforming the 'weakest link': a human-computer interaction approach to usable and effective security. BT Technical Journal, 19(3), 122-131. (Also at http://www.bt.com/bttj/) Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Schneier, B. (2000), Secrets and Lies, John Wiley & Sons, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Spector, Y., & Ginzberg, J. (1994). Pass sentence - a new approach to computer code. Computers and Security, 13(2), 145-160. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Whitten, A. & Tygar, J. D. (1999) Why Johnny can't encrypt: A usability evaluation of PGP 5.0, Proceedings of the 8th USENIX Security Symposium, August 1999, Washington. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Safe and sound: a safety-critical approach to security

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                NSPW '01: Proceedings of the 2001 workshop on New security paradigms
                September 2001
                157 pages
                ISBN:1581134576
                DOI:10.1145/508171

                Copyright © 2001 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 10 September 2001

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • Article

                Acceptance Rates

                Overall Acceptance Rate62of170submissions,36%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader