By Topic

2012 Workshop on Socio-Technical Aspects in Security and Trust

25-25 June 2012

Filter Results

Displaying Results 1 - 19 of 19
  • [Front and back cover]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1767 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Foreword from the Workshop Chairs - STAST 2012

    Publication Year: 2012, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (84 KB) | HTML iconHTML
    Freely Available from IEEE
  • Foreword from the Programme Chairs - STAST 2012

    Publication Year: 2012, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (68 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committee

    Publication Year: 2012, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2012, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Trust Engineering via Security Protocols

    Publication Year: 2012, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    Security protocols form a central part of the trust infrastructure of the online world. They allow principals to make decisions that authorize or prohibit actions of other principals, and to make those decisions based on information gathered from other principals. In this invited talk at Socio-Technical Aspects in Security and Trust 2012 (STAST), a view of protocol design that can serve as a trust... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention

    Publication Year: 2012, Page(s):3 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    We describe a novel approach to reduce the impact of spoofing by a subtle change in the login process. At the heart of our contribution is the understanding that current antispoof technologies fail largely as a result of the difficulties to communicate security and risk to typical users. Accordingly, our solution is oblivious to whether the user was tricked by a fraudster or not. We achieve that b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Model to Support the Reconciliation of Security Actions across Enterprises

    Publication Year: 2012, Page(s):11 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    As an increasing amount of businesses look towards collaborations to gain a strategic advantage in the marketplace, the importance of systems to support these collaborative activities significantly increases. Within this area, arguably one of the most important issues is supporting interaction security. This is both at the initial, higher level of humans from businesses agreeing on joint security ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Socio-Technical and Resilience Frameworks to Anticipate Threat

    Publication Year: 2012, Page(s):19 - 26
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (682 KB) | HTML iconHTML

    This paper explores how frameworks based on socio-technical systems thinking and theories of resilience can be applied within the field of business security in order to help anticipate and subsequently prevent organizational threats. The paper applies a socio-technical framework to two fictional terrorism scenarios as exemplars, namely a cyber systems attack at the London 2012 Olympics and poisoni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved Visual Preference Authentication

    Publication Year: 2012, Page(s):27 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1125 KB) | HTML iconHTML

    We describe an improved preference-based password reset scheme in which both security and usability of previous approaches are dramatically improved on. We report on experimental findings supporting these claims. Our experiment shows a false negative rate on the order of 0.9% and a false positive rate on the order of 0.5% for a choice of parameters that result in a registration time of 100 seconds... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Information Trustworthiness Advice in Decision Making

    Publication Year: 2012, Page(s):35 - 42
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB) | HTML iconHTML

    In a society at the brink of information overload, using a measurement of trustworthiness to focus attention and ultimately reduce risks faced by individuals is an increasingly attractive option in supporting well-conceived decisions. As such, this paper seeks to advance discussions on trustworthiness and decision-making research by critically investigating individuals' ability to cognitively comb... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Security Investments in Networks of Varying Size and Topology

    Publication Year: 2012, Page(s):43 - 47
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB) | HTML iconHTML

    This paper looks at network security from a game-theoretic point of view. Through the formulation and examination of increasingly complex scenarios, we formulate a model for utility-based security decisions. We look at the decision for one person to buy security software for herself and to buy security software in the context of two or more people. By modeling security as a public good, we examine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2012, Page(s): 48
    Request permission for commercial reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • [Publisher's information]

    Publication Year: 2012, Page(s): 50
    Request permission for commercial reuse | PDF file iconPDF (159 KB) | HTML iconHTML
    Freely Available from IEEE