When Information Improves Information Security (CMU-CyLab-09-004)
نویسندگان
چکیده
We investigate a mixed economy of an individual rational expert and several naı̈ve near-sightedagents in the context of security decision making. Agents select between three canonical security ac-tions to navigate the complex security risks of weakest-link, best shot and total effort interdependencies.We further study the impact of two information conditions on agents’ choices. We provide a detailedoverview of a methodology to effectively determine and compare strategies and payoffs between thedifferent regimes. To analyze the impact of the different information conditions we propose a newformalization. We define the price of uncertainty as the ratio of the expected payoff in the completeinformation environment over the payoff in the incomplete information environment. ∗This work is supported in part by the National Science Foundation under ITR award ANI-0331659 (100x100), and the ArmyResearch Office through contract number DAAD19-02-1-0389. Jens Grossklags’ work is also funded through a University ofCalifornia MICRO project grant in collaboration with DoCoMo USA Labs.
منابع مشابه
Help Me Help You: Using Trustworthy Host-Based Information in the Network (CMU-CyLab-09-016)
As hardware support for improved endhost security becomes ubiquitous, it is important to consider how network security and performance can benefit from these improvements. If endhosts (or at least portions of each endhost) can be trusted, then network infrastructure no longer needs to arduously and imprecisely reconstruct data already known by the endhosts. Through the design of a general-purpo...
متن کاملAudit Games (CMU-CyLab-13-004)
Effective enforcement of laws and policies requires expending resources to prevent and detect offenders, as well as appropriate punishment schemes to deter violators. In particular, enforcement of privacy laws and policies in modern organizations that hold large volumes of personal information (e.g., hospitals, banks, and Web services providers) relies heavily on internal audit mechanisms. We s...
متن کاملOn the Semantics of Purpose Requirements in Privacy Policies (CMU-CS-11-102)
Privacy policies often place requirements on the purposes for which a governed entity may use personal information. For example, regulations, such as HIPAA, require that hospital employees use medical information for only certain purposes, such as treatment. Thus, using formal or automated methods for enforcing privacy policies requires a semantics of purpose requirements to determine whether a...
متن کاملAccess Control for Home Data Sharing: Attitudes, Needs and Practices (CMU-CyLab-09-013, CMU-PDL-09-110)
As digital content becomes more prevalent in the home, nontechnical users are increasingly interested in sharing that content with others and accessing it from multiple devices. Not much is known about how these users think about controlling access to this data. To better understand this, we conducted semi-structured, in-situ interviews with 33 users in 15 households. We found that users create...
متن کاملAudit Mechanisms for Provable Risk Management and Accountable Data Governance (CMU-CyLab-12-020)
Organizations that collect and use large volumes of personal information are expected under the principle of accountable data governance to take measures to protect data subjects from risks that arise from inapproriate uses of this information. In this paper, we focus on a specific class of mechanisms— audits to identify policy violators coupled with punishments—that organizations such as hospi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009