skip to main content
Skip header Section
Secrets & Lies: Digital Security in a Networked WorldAugust 2000
Publisher:
  • John Wiley & Sons, Inc.
  • 605 Third Ave. New York, NY
  • United States
ISBN:978-0-471-25311-2
Published:01 August 2000
Pages:
304
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

From the Book: I have written this book partly to correct a mistake. Seven years ago I wrote another book: Applied Cryptography. In it, I described a mathematical utopia: algorithms that would keep your deepest secrets safe for millennia, protocols that could perform the most fantastical electronic interactions-unregulated gambling, undetectable authentication, anonymous cash-safely and securely. In my vision cryptography was the great technological equalizer; anyone with a cheap (and getting cheaper every year) computer could have the same security as the largest government. In the second edition of the same book, written two years later, I went so far as to write: "It is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics." It's just not true. Cryptography can't do any of that. It's not that cryptography has gotten weaker since 1994, or that the things I described in that book are no longer true; it's that cryptography doesn't exist in a vacuum. Cryptography is a branch of mathematics. And like all mathematics, it involves numbers, equations, and logic. Security, palpable security that you or I might find useful in our lives, involves people: things people know, relationships between people, people and how they relate to machines. Digital security involves computers: complex, unstable, buggy computers. Mathematics is perfect; reality is subjective. Mathematics is defined; computers are ornery. Mathematics is logical; people are erratic, capricious, and barely comprehensible. The error of Applied Cryptography is that I didn't talk at all about the context. I talked about cryptography as if it were The Answer. I was pretty naive. Theresult wasn't pretty. Readers believed that cryptography was a kind of magic security dust that they could sprinkle over their software and make it secure. That they could invoke magic spells like "128-bit key" and "public-key infrastructure." A colleague once told me that the world was full of bad security systems designed by people who read Applied Cryptography. Since writing the book, I have made a living as a cryptography consultant: designing and analyzing security systems. To my initial surprise, I found that the weak points had nothing to do with the mathematics. They were in the hardware, the software, the networks, and the people. Beautiful pieces of mathematics were made irrelevant through bad programming, a lousy operating system, or someone's bad password choice. I learned to look beyond the cryptography, at the entire system, to find weaknesses. I started repeating a couple of sentiments you'll find throughout this book: "Security is a chain; it's only as secure as the weakest link." "Security is a process, not a product." Any real-world system is a complicated series of interconnections. Security must permeate the system: its components and connections. And in this book I argue that modern systems have so many components and connections-some of them not even known by the systems' designers, implementers, or users-that insecurities always remain. No system is perfect; no technology is The Answer. This is obvious to anyone involved in real-world security. In the real world, security involves processes. It involves preventative technologies, but also detection and reaction processes, and an entire forensics system to hunt down and prosecute the guilty. Security is not a product; it itself is a process. And if we're ever going to make our digital systems secure, we're going to have to start building processes. A few years ago I heard a quotation, and I am going to modify it here: If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology. This book is about those security problems, the limitations of technology, and the solutions. Read this book in order, from beginning to end. No, really. Many technical books are meant to skim, bounce around in, and use as a reference. This book isn't. This book has a plot; it tells a story. And like any good story, it makes less sense telling it out of order. The chapters build on each other, and you won't buy the ending if you haven't come along on the journey. Actually, I want you to read the book through once, and then read it through a second time. This book argues that in order to understand the security of a system, you need to look at the entire system-and not at any particular technologies. Security itself is an interconnected system, and it helps to have cursory knowledge of everything before learning more about anything. But two readings is probably too much to ask; forget I mentioned it. This book has three parts. Part 1 is "The Landscape," and gives context to the rest of the book: who the attackers are, what they want, and what we need to deal with the threats. Part 2 is "Technologies," basically a bunch of chapters describing different security technologies and their limitations. Part 3 is "Strategies": Given the requirements of the landscape and the limitations of the technologies, what do we do now I think digital security is about the coolest thing you can work on today, and this book reflects that feeling. It's serious, but fun, too. Enjoy the read.

Cited By

  1. Ebert N, Schaltegger T, Ambuehl B, Schöni L, Zimmermann V and Knieps M (2023). Learning from safety science, Computers and Security, 134:C, Online publication date: 1-Nov-2023.
  2. ACM
    FREJUS M, GUIBOURDENCHE J and MARTINI D Contextualité des questions de privacy dans l'utilisation de services interactifs et conséquences pour la conception Proceedings of the 34th Conference on l'Interaction Humain-Machine, (1-10)
  3. Mvula P, Branco P, Jourdan G and Viktor H (2022). COVID-19 malicious domain names classification▪, Expert Systems with Applications: An International Journal, 204:C, Online publication date: 15-Oct-2022.
  4. Khan N, Yaqoob A, Khan M and Ikram N (2022). The cybersecurity behavioral research, Computers and Security, 120:C, Online publication date: 1-Sep-2022.
  5. Mahmood S, Nguyen H and Shaikh S (2022). Systematic threat assessment and security testing of automotive over-the-air (OTA) updates, Vehicular Communications, 35:C, Online publication date: 1-Jun-2022.
  6. ACM
    Witte T, Groner R, Raschke A, Tichy M, Pekaric I and Felderer M Towards model co-evolution across self-adaptation steps for combined safety and security analysis Proceedings of the 17th Symposium on Software Engineering for Adaptive and Self-Managing Systems, (106-112)
  7. Rashid Z, Noor U and Altmann J (2022). Economic model for evaluating the value creation through information sharing within the cybersecurity information sharing ecosystem, Future Generation Computer Systems, 124:C, (436-466), Online publication date: 1-Nov-2021.
  8. Altaf A, Faily S, Dogan H, Thron E and Mylonas A Integrated Design Framework for Facilitating Systems-Theoretic Process Analysis Computer Security. ESORICS 2021 International Workshops, (58-73)
  9. Menges U, Hielscher J, Buckmann A, Kluge A, Sasse M and Verret I Why IT Security Needs Therapy Computer Security. ESORICS 2021 International Workshops, (335-356)
  10. Altaf A, Faily S, Dogan H, Mylonas A and Thron E Use-Case Informed Task Analysis for Secure and Usable Design Solutions in Rail Critical Information Infrastructures Security, (168-185)
  11. Alavizadeh H, Hong J, Kim D and Jang-Jaccard J (2021). Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud, Computers and Security, 102:C, Online publication date: 1-Mar-2021.
  12. ACM
    Kesan J and Zhang L (2020). Analysis of Cyber Incident Categories Based on Losses, ACM Transactions on Management Information Systems, 11:4, (1-28), Online publication date: 31-Dec-2021.
  13. Lallie H, Debattista K and Bal J (2020). A review of attack graph and attack tree visual syntax in cyber security, Computer Science Review, 35:C, Online publication date: 1-Feb-2020.
  14. ACM
    Jayasinghe K and Poravi G A Survey of Attack Instances of Cryptojacking Targeting Cloud Infrastructure Proceedings of the 2020 2nd Asia Pacific Information Technology Conference, (100-107)
  15. Eom T, Hong J, An S, Park J, Kim D and Cimato S (2020). A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models, Security and Communication Networks, 2020, Online publication date: 1-Jan-2020.
  16. Zimmermann V and Gerber N (2020). The password is dead, long live the password – A laboratory study on user perceptions of authentication schemes, International Journal of Human-Computer Studies, 133:C, (26-44), Online publication date: 1-Jan-2020.
  17. Kammüller F (2022). Attack trees in Isabelle extended with probabilities for quantum cryptography, Computers and Security, 87:C, Online publication date: 1-Nov-2019.
  18. ACM
    Kiennert C, Ismail Z, Debar H and Leneutre J (2018). A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization, ACM Computing Surveys, 51:5, (1-31), Online publication date: 30-Sep-2019.
  19. ACM
    Huang K, Siegel M and Madnick S (2018). Systematically Understanding the Cyber Attack Business, ACM Computing Surveys, 51:4, (1-36), Online publication date: 31-Jul-2019.
  20. Anabo I, Elexpuru-Albizuri I and Villardón-Gallego L (2019). Revisiting the Belmont Report's ethical principles in internet-mediated research, Ethics and Information Technology, 21:2, (137-149), Online publication date: 1-Jun-2019.
  21. Hong J, Enoch S, Kim D, Nhlabatsi A, Fetais N and Khan K (2018). Dynamic security metrics for measuring the effectiveness of moving target defense techniques, Computers and Security, 79:C, (33-52), Online publication date: 1-Nov-2018.
  22. ACM
    Laube S and Böhme R (2017). Strategic Aspects of Cyber Risk Information Sharing, ACM Computing Surveys, 50:5, (1-36), Online publication date: 30-Sep-2018.
  23. Norkin V, Gaivoronski A, Zaslavsky V and Knopov P (2018). Models of the Optimal Resource Allocation for the Critical Infrastructure Protection, Cybernetics and Systems Analysis, 54:5, (696-706), Online publication date: 1-Sep-2018.
  24. ACM
    Codetta-Raiteri D and Portinale L (2018). Decision Networks for Security Risk Assessment of Critical Infrastructures, ACM Transactions on Internet Technology, 18:3, (1-22), Online publication date: 31-Aug-2018.
  25. ACM
    Johnson P, Lagerström R and Ekstedt M A Meta Language for Threat Modeling and Attack Simulations Proceedings of the 13th International Conference on Availability, Reliability and Security, (1-8)
  26. Yan Z, Robertson T, Yan R, Park S, Bordoff S, Chen Q and Sprissler E (2018). Finding the weakest links in the weakest link, Computers in Human Behavior, 84:C, (375-382), Online publication date: 1-Jul-2018.
  27. ACM
    Brown H Qualitative risk assessment of cyberattacks on power systems Proceedings of the Fifth Cybersecurity Symposium, (1-6)
  28. ACM
    Pendleton M, Garcia-Lebron R, Cho J and Xu S (2016). A Survey on Systems Security Metrics, ACM Computing Surveys, 49:4, (1-35), Online publication date: 31-Dec-2018.
  29. Zimmermann V and Gerber N “If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies Human Aspects of Information Security, Privacy and Trust, (265-283)
  30. ACM
    Das S, Laput G, Harrison C and Hong J Thumprint Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, (3764-3774)
  31. Bahamou S, Ouadghiri D and Bonnin J (2017). When game theory meets security and privacy related risk assessment of vehicular networks (VANET), Journal of Mobile Multimedia, 12:3-4, (213-224), Online publication date: 1-Apr-2017.
  32. McCormac A, Zwaans T, Parsons K, Calic D, Butavicius M and Pattinson M (2017). Individual differences and Information Security Awareness, Computers in Human Behavior, 69:C, (151-156), Online publication date: 1-Apr-2017.
  33. ACM
    Bahamou S, El Ouadghiri M and Bonnin J When Game Theory Meets VANET's Security and Privacy Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, (292-297)
  34. ACM
    Heitzenrater C and Simpson A A case for the economics of secure software development Proceedings of the 2016 New Security Paradigms Workshop, (92-105)
  35. Ramachandran M (2016). Software security requirements management as an emerging cloud computing service, International Journal of Information Management: The Journal for Information Professionals, 36:4, (580-590), Online publication date: 1-Aug-2016.
  36. Bahamou S, Bonnin J and Idriss El Ouadghiri M Vehicular Ad-hoc Network's Privacy Assessment Based on Attack Tree Proceedings of the 10th International Workshop on Communication Technologies for Vehicles - Volume 9669, (121-130)
  37. ACM
    Alrajeh D, van Lamsweerde A, Kramer J, Russo A and Uchitel S Risk-driven revision of requirements models Proceedings of the 38th International Conference on Software Engineering, (855-865)
  38. Hong J and Kim D (2016). Assessing the Effectiveness of Moving Target Defenses Using Security Models, IEEE Transactions on Dependable and Secure Computing, 13:2, (163-177), Online publication date: 1-Mar-2016.
  39. ACM
    Heartfield R and Loukas G (2015). A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks, ACM Computing Surveys, 48:3, (1-39), Online publication date: 8-Feb-2016.
  40. ACM
    Koutris P, Upadhyaya P, Balazinska M, Howe B and Suciu D (2015). Query-Based Data Pricing, Journal of the ACM, 62:5, (1-44), Online publication date: 2-Nov-2015.
  41. ACM
    Maria R, Rodrigues L and Pinto N ScrumS Proceedings of the 7th International Conference on Management of computational and collective intElligence in Digital EcoSystems, (43-47)
  42. ACM
    Motii A, Hamid B, Lanusse A and Bruel J Guiding the selection of security patterns based on security requirements and pattern classification Proceedings of the 20th European Conference on Pattern Languages of Programs, (1-17)
  43. ACM
    Kirlappos I, Parkin S and Sasse M (2015). "Shadow security" as a tool for the learning organization, ACM SIGCAS Computers and Society, 45:1, (29-37), Online publication date: 19-Feb-2015.
  44. Gribaudo M, Iacono M and Marrone S (2015). Exploiting Bayesian Networks for the Analysis of Combined Attack Trees, Electronic Notes in Theoretical Computer Science (ENTCS), 310:C, (91-111), Online publication date: 5-Jan-2015.
  45. Rashtian H, Boshmaf Y, Jaferian P and Beznosov K To befriend or not? a model of friend request acceptance on Facebook Proceedings of the Tenth USENIX Conference on Usable Privacy and Security, (285-300)
  46. Kirlappos I and Sasse M What Usable Security Really Means Proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 8533, (69-78)
  47. Karpati P, Redda Y, Opdahl A and Sindre G (2014). Comparing attack trees and misuse cases in an industrial setting, Information and Software Technology, 56:3, (294-308), Online publication date: 1-Mar-2014.
  48. Kiesling E, Ekelhart A, Grill B, Strauss C and Stummer C Simulation-based optimization of information security controls Proceedings of the 2013 Winter Simulation Conference: Simulation: Making Decisions in a Complex World, (2054-2065)
  49. Abernethy M and Rai S An Innovative Fingerprint Feature Representation Method to Facilitate Authentication Using Neural Networks Proceedings, Part II, of the 20th International Conference on Neural Information Processing - Volume 8227, (689-696)
  50. Zeng W, Liu K and Koutny M Cost-benefit analysis of digital rights management products using stochastic models Proceedings of the 46th Annual Simulation Symposium, (1-10)
  51. Li S, Rickert R and Sliva A Risk-Based models of attacker behavior in cybersecurity Proceedings of the 6th international conference on Social Computing, Behavioral-Cultural Modeling and Prediction, (523-532)
  52. ACM
    Bedi P, Gandotra V, Singhal A, Narang H and Sharma S (2013). Mitigating multi-threats optimally in proactive threat management, ACM SIGSOFT Software Engineering Notes, 38:1, (1-7), Online publication date: 23-Jan-2013.
  53. Zou J and Pavlovski C (2013). Accountability in enterprise mashup services, Advances in Software Engineering, 2013, (1-1), Online publication date: 1-Jan-2013.
  54. Roy A, Kim D and Trivedi K (2012). Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees, Security and Communication Networks, 5:8, (929-943), Online publication date: 1-Aug-2012.
  55. Alrajeh D, Kramer J, Lamsweerde A, Russo A and Uchitel S Generating obstacle conditions for requirements completeness Proceedings of the 34th International Conference on Software Engineering, (705-715)
  56. ACM
    Koutris P, Upadhyaya P, Balazinska M, Howe B and Suciu D Query-based data pricing Proceedings of the 31st ACM SIGMOD-SIGACT-SIGAI symposium on Principles of Database Systems, (167-178)
  57. Pal R and Hui P Modeling internet security investments Proceedings of the Second international conference on Decision and Game Theory for Security, (239-257)
  58. Pal R, Golubchik L and Psounis K Aegis Proceedings of the Second international conference on Decision and Game Theory for Security, (131-150)
  59. ACM
    Gandotra V, Archana Singhal A and Bedi P (2011). Layered security architecture for threat management using multi-agent system, ACM SIGSOFT Software Engineering Notes, 36:5, (1-11), Online publication date: 30-Sep-2011.
  60. ACM
    Gandhi R and Lee S (2011). Discovering Multidimensional Correlations among Regulatory Requirements to Understand Risk, ACM Transactions on Software Engineering and Methodology, 20:4, (1-37), Online publication date: 1-Sep-2011.
  61. Bibu G Security in the context of multi-agent systems The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3, (1339-1340)
  62. ACM
    Khot R, Srinathan K and Khot R NAPTune Proceedings of the 3rd Indian Conference on Human-Computer Interaction, (47-56)
  63. Vavoulas N and Xenakis C A quantitative risk analysis approach for deliberate threats Proceedings of the 5th international conference on Critical Information Infrastructures Security, (13-25)
  64. Mathew S, Petropoulos M, Ngo H and Upadhyaya S A data-centric approach to insider attack detection in database systems Proceedings of the 13th international conference on Recent advances in intrusion detection, (382-401)
  65. Sankaranarayanan V, Upadhyaya S and Kwiat K QoS-T Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security, (102-117)
  66. Faily S and Fléchais I Barry is not the weakest link Proceedings of the 24th BCS Interaction Specialist Group Conference, (124-132)
  67. ACM
    Halonen P and Hätönen K Towards holistic security management through coherent measuring Proceedings of the Fourth European Conference on Software Architecture: Companion Volume, (155-161)
  68. ACM
    Kainda R, Flechais I and Roscoe A Two heads are better than one Proceedings of the Sixth Symposium on Usable Privacy and Security, (1-13)
  69. Jennings P (2010). Managing the risks of smarter planet solutions, IBM Journal of Research and Development, 54:4, (366-374), Online publication date: 1-Jul-2010.
  70. ACM
    Roy A, Kim D and Trivedi K Cyber security analysis using attack countermeasure trees Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, (1-4)
  71. ACM
    Inglesant P and Sasse M The true cost of unusable password policies Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (383-392)
  72. Dalton G, Edge K, Mills R and Raines R (2010). Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees, International Journal of Security and Networks, 5:2/3, (87-95), Online publication date: 1-Mar-2010.
  73. Cai C BANBAD - A Centralized belief-networks-based anomaly detection algorithm for MANETs Proceedings of the 28th IEEE conference on Global telecommunications, (4362-4367)
  74. ACM
    Singh S and Morley C Young Australians' privacy, security and trust in internet banking Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7, (121-128)
  75. ACM
    Norman D (2009). THE WAY I SEE ITWhen security gets in the way, Interactions, 16:6, (60-63), Online publication date: 1-Nov-2009.
  76. ACM
    Ben-Asher N, Meyer J, Parmet Y, Moeller S and Englert R Security and usability research using a microworld environment Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services, (1-4)
  77. ACM
    Beautement A, Sasse M and Wonham M The compliance budget Proceedings of the 2008 New Security Paradigms Workshop, (47-58)
  78. Patrikakis C, Kyriazanos D, Voulodimos A and Nikolakopoulos I (2009). Trust and security in Personal Network environments, International Journal of Electronic Security and Digital Forensics, 2:4, (365-376), Online publication date: 1-Aug-2009.
  79. ACM
    Romero-Mariona J, Ziv H and Richardson D Later stages support for security requirements The Fifth Richard Tapia Celebration of Diversity in Computing Conference: Intellect, Initiatives, Insight, and Innovations, (103-107)
  80. Karat J, Karat C, Bertino E, Li N, Ni Q, Brodie C, Lobo J, Calo S, Cranor L, Kumaraguru P and Reeder R (2009). Policy framework for security and privacy management, IBM Journal of Research and Development, 53:2, (242-255), Online publication date: 1-Mar-2009.
  81. ACM
    Romero-Mariona J, Ziv H and Richardson D SRRS Proceedings of the 2008 international workshop on Recommendation systems for software engineering, (50-52)
  82. ACM
    Vidyaraman S, Chandrasekaran M and Upadhyaya S Position Proceedings of the 2007 Workshop on New Security Paradigms, (75-80)
  83. Saini V, Duan Q and Paruchuri V (2008). Threat modeling using attack trees, Journal of Computing Sciences in Colleges, 23:4, (124-131), Online publication date: 1-Apr-2008.
  84. ACM
    Ketel M IT security risk management Proceedings of the 46th Annual Southeast Regional Conference on XX, (373-376)
  85. Eusgeld I References Dependability metrics, (267-300)
  86. Bursztein E and Goubault-Larrecq J A logical framework for evaluating network resilience against faults and attacks Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security, (212-227)
  87. Wilson P, Frey A, Mihm T, Kershaw D and Alves T (2007). Implementing Embedded Security on Dual-Virtual-CPU Systems, IEEE Design & Test, 24:6, (582-591), Online publication date: 1-Nov-2007.
  88. Jürgenson A and Willemson J Processing multi-parameter attacktrees with estimated parameter values Proceedings of the Security 2nd international conference on Advances in information and computer security, (308-319)
  89. Sveen F, Torres J and Sarriegi J Learning from your elders Proceedings of the 26th international conference on Computer Safety, Reliability, and Security, (224-237)
  90. Vassilev A, du Castel B and Ali A (2007). Personal Brokerage of Web Service Access, IEEE Security and Privacy, 5:5, (24-31), Online publication date: 1-Sep-2007.
  91. Singh S, Cabraal A, Demosthenous C, Astbrink G and Furlong M Security design based on social and cultural practice Proceedings of the 2nd international conference on Usability and internationalization, (476-485)
  92. Adamson G The technologist and internet security and privacy practices Proceedings of the 2nd international conference on Usability and internationalization, (295-304)
  93. Karvonen K Users and trust Proceedings of the 4th international conference on Universal access in human-computer interaction: applications and services, (893-902)
  94. Rubin B and Misra B Creating a Computer Security Curriculum in a Software Engineering Program Proceedings of the 29th international conference on Software Engineering, (732-735)
  95. ACM
    Singh S, Cabraal A, Demosthenous C, Astbrink G and Furlong M Password sharing Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (895-904)
  96. Helmer G, Wong J, Slagell M, Honavar V, Miller L, Wang Y, Wang X and Stakhanova N (2007). Software fault tree and coloured Petri net based specification, design and implementation of agent-based intrusion detection systems, International Journal of Information and Computer Security, 1:1/2, (109-142), Online publication date: 1-Jan-2007.
  97. Pang Y, Andrew T and David N (2007). Two-factor cancelable biometrics authenticator, Journal of Computer Science and Technology, 22:1, (54-59), Online publication date: 1-Jan-2007.
  98. ACM
    Singh S, Cabraal A and Hermansson G What is your husband's name? Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments, (237-244)
  99. ACM
    Ou X, Boyer W and McQueen M A scalable approach to attack graph generation Proceedings of the 13th ACM conference on Computer and communications security, (336-345)
  100. Yager R (2006). OWA trees and their role in security modeling using attack trees, Information Sciences: an International Journal, 176:20, (2933-2959), Online publication date: 1-Oct-2006.
  101. ACM
    Snyder R Ethical hacking and password cracking Proceedings of the 3rd annual conference on Information security curriculum development, (13-18)
  102. Dourish P and Anderson K (2006). Collective information practice, Human-Computer Interaction, 21:3, (319-342), Online publication date: 1-Sep-2006.
  103. Buldas A, Laud P, Priisalu J, Saarepera M and Willemson J Rational choice of security measures via multi-parameter attack trees Proceedings of the First international conference on Critical Information Infrastructures Security, (235-248)
  104. Bistarelli S, Dall'Aglio M and Peretti P Strategic games on defense trees Proceedings of the 4th international conference on Formal aspects in security and trust, (1-15)
  105. Mouratidis H, Jürjens J and Fox J Towards a comprehensive framework for secure systems development Proceedings of the 18th international conference on Advanced Information Systems Engineering, (48-62)
  106. Botha R and Gaadingwe T (2006). Reflecting on 20 SEC conferences, Computers and Security, 25:4, (247-256), Online publication date: 1-Jun-2006.
  107. Sankaranarayanan V and Upadhyaya S A trust assignment model based on alternate actions payoff Proceedings of the 4th international conference on Trust Management, (339-353)
  108. ACM
    Hertzum M (2006). Minimal-feedback hints for remembering passwords, Interactions, 13:3, (38-40), Online publication date: 1-May-2006.
  109. ACM
    Hardee J, West R and Mayhorn C (2006). To download or not to download, Interactions, 13:3, (32-37), Online publication date: 1-May-2006.
  110. Ali A Zero footprint secure internet authentication using network smart card Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications, (91-104)
  111. ACM
    Müller V (2006). Some information is too dangerous to be on the internet, ACM SIGCAS Computers and Society, 36:1, (2-es), Online publication date: 1-Mar-2006.
  112. Liu C and Orgun M Towards security labelling Proceedings of the 29th Australasian Computer Science Conference - Volume 48, (69-76)
  113. ACM
    Campbell S (2006). How to think about security failures, Communications of the ACM, 49:1, (37-39), Online publication date: 1-Jan-2006.
  114. Mauw S and Oostdijk M Foundations of attack trees Proceedings of the 8th international conference on Information Security and Cryptology, (186-198)
  115. Bardram E (2005). The trouble with login: on usability and computer security in ubiquitous computing, Personal and Ubiquitous Computing, 9:6, (357-367), Online publication date: 16-Nov-2005.
  116. ACM
    Hasan R, Myagmar S, Lee A and Yurcik W Toward a threat model for storage systems Proceedings of the 2005 ACM workshop on Storage security and survivability, (94-102)
  117. ACM
    Gupta V (2005). Trust and accountability issues in scalable invalidation-based web cache consistency, ACM SIGOPS Operating Systems Review, 39:4, (23-36), Online publication date: 1-Oct-2005.
  118. Gonzalez J Towards a cyber security reporting system – a quality improvement process Proceedings of the 24th international conference on Computer Safety, Reliability, and Security, (368-380)
  119. Babar M, Wang X and Gorton I Supporting security sensitive architecture design Proceedings of the First international conference on Quality of Software Architectures and Software Quality, and Proceedings of the Second International conference on Software Quality, (140-154)
  120. Walter M and Trinitis C Quantifying the security of composed systems Proceedings of the 6th international conference on Parallel Processing and Applied Mathematics, (1026-1033)
  121. Jirotka M, Procter R, Hartswood M, Slack R, Simpson A, Coopmans C, Hinds C and Voss A (2005). Collaboration and Trust in Healthcare Innovation, Computer Supported Cooperative Work, 14:4, (369-398), Online publication date: 1-Aug-2005.
  122. ACM
    Mouratidis H, Kolp M, Faulkner S and Giorgini P A secure architectural description language for agent systems Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems, (578-585)
  123. ACM
    DiGioia P and Dourish P Social navigation as a model for usable security Proceedings of the 2005 symposium on Usable privacy and security, (101-108)
  124. Apvrille A and Pourzandi M (2005). Secure Software Development by Example, IEEE Security and Privacy, 3:4, (10-17), Online publication date: 1-Jul-2005.
  125. Hole K, Dyrnes E and Thorsheim P (2005). Securing Wi-Fi Networks, Computer, 38:7, (28-34), Online publication date: 1-Jul-2005.
  126. Sadasivam K, Samudrala B and Yang T (2005). Design of network security projects using honeypots, Journal of Computing Sciences in Colleges, 20:4, (282-293), Online publication date: 1-Apr-2005.
  127. Hommersom A, Meyer J and de Vink E (2005). Toward Reasoning about Security Protocols, Electronic Notes in Theoretical Computer Science (ENTCS), 126:C, (53-75), Online publication date: 8-Mar-2005.
  128. ACM
    Sukhai N Access control & biometrics Proceedings of the 1st annual conference on Information security curriculum development, (124-127)
  129. Lampson B (2004). Computer Security in the Real World, Computer, 37:6, (37-46), Online publication date: 1-Jun-2004.
  130. van Lamsweerde A Elaborating Security Requirements by Construction of Intentional Anti-Models Proceedings of the 26th International Conference on Software Engineering, (148-157)
  131. ACM
    Ives B, Walsh K and Schneider H (2004). The domino effect of password reuse, Communications of the ACM, 47:4, (75-78), Online publication date: 1-Apr-2004.
  132. Nicol D, Sanders W and Trivedi K (2004). Model-Based Evaluation, IEEE Transactions on Dependable and Secure Computing, 1:1, (48-65), Online publication date: 1-Jan-2004.
  133. Kleist V (2004). A Transaction Cost Model of Electronic Trust, Electronic Commerce Research, 4:1-2, (41-57), Online publication date: 1-Jan-2004.
  134. ACM
    Huang Y and Lee W A cooperative intrusion detection system for ad hoc networks Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, (135-147)
  135. ACM
    Hamdi M and Boudriga N Algebraic specification of network security risk management Proceedings of the 2003 ACM workshop on Formal methods in security engineering, (52-60)
  136. ACM
    Teitelbaum B and Shalunov S What QoS research hasn't understood about risk Proceedings of the ACM SIGCOMM workshop on Revisiting IP QoS: What have we learned, why do we care?, (148-150)
  137. ACM
    Wang H and Wang C (2003). Taxonomy of security considerations and software quality, Communications of the ACM, 46:6, (75-78), Online publication date: 1-Jun-2003.
  138. Nick M, Groß S and Snoek B How knowledge management can support the IT security of eGovernment services Proceedings of the 4th IFIP international working conference on Knowledge management in electronic government, (151-162)
  139. Venter H and Eloff J (2003). Feature, Computers and Security, 22:4, (299-307), Online publication date: 1-May-2003.
  140. Rogers M (2003). Feature, Computers and Security, 22:4, (292-298), Online publication date: 1-May-2003.
  141. Janczewski L New challenges in privacy protection Advanced topics in global information management, (125-139)
  142. Kou W, Poon S and Knorr E Smart cards and applications Payment technologies for E-commerce, (95-126)
  143. Long B Formalising key distribution in the presence of trust using object-Z Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21, (59-66)
  144. Chinburg S, Sharda R and Weiser M Establishing the business value of network security using analytical hierarchy process Creating business value with information technology, (203-219)
  145. ACM
    Buttyán L and Hubaux J (2003). Report on a working session on security in wireless ad hoc networks, ACM SIGMOBILE Mobile Computing and Communications Review, 7:1, (74-94), Online publication date: 1-Jan-2003.
  146. Hall R (2003). Some Reading for ASE Island, Automated Software Engineering, 10:1, (103-109), Online publication date: 1-Jan-2003.
  147. ACM
    Lee W (2002). Applying data mining to intrusion detection, ACM SIGKDD Explorations Newsletter, 4:2, (35-42), Online publication date: 1-Dec-2002.
  148. Sindre G, Opdahl A and Brevik G Generalization/specialization as a structuring mechanism for misuse cases Proceedings of the 3rd Symposium on Requirements Engineering for Information Security, (1-16)
  149. ACM
    Dourish P and Redmiles D An approach to usable security based on event monitoring and visualization Proceedings of the 2002 workshop on New security paradigms, (75-81)
  150. Bierman E and Cloete E Classification of malicious host threats in mobile agent computing Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology, (141-148)
  151. Poslad S, Charlton P and Calisti M Specifying standard security mechanisms in multi-agent systems Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice, (163-176)
  152. ACM
    Whitaker A, Shaw M and Gribble S Denali Proceedings of the 10th workshop on ACM SIGOPS European workshop, (10-15)
  153. ACM
    Buchegger S and Le Boudec J Performance analysis of the CONFIDANT protocol Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, (226-236)
  154. Cabrera J, Lewis L, Qin X, Lee W and Mehra R (2002). Proactive Intrusion Detection and Distributed Denial of Service Attacks—A Case Study in Security Management, Journal of Network and Systems Management, 10:2, (225-254), Online publication date: 1-Jun-2002.
  155. Buchegger S and Le Boudec J Nodes bearing grudges Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing, (403-410)
Contributors

Recommendations