Ceremony Design and Analysis

نویسنده

  • Carl M. Ellison
چکیده

The concept of ceremony is introduced as an extension of the concept of network protocol, with human nodes alongside computer nodes and with communication links that include UI, human-to-human communication and transfers of physical objects that carry data. What is out-of-band to a protocol is in-band to a ceremony, and therefore subject to design and analysis using variants of the same mature techniques used for the design and analysis of protocols. Ceremonies include all protocols, as well as all applications with a user interface, all workflow and all provisioning scenarios. A secure ceremony is secure against both normal attacks and social engineering. However, some secure protocols imply ceremonies that cannot be made secure.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Anthropological Study of Death and Funeral Ceremony with focus in Gilan Province

A rite of passage is a ritual event that marks a person's transition from one status to another, including birth, coming-of-age, marriage and death. One of the rite of passage is funeral and its Rituals .A funeral is a ceremony for honoring, respecting, sanctifying, or remembering the life of a person who has died. Funerary customs comprise the complex of beliefs and practices used by a culture...

متن کامل

Free Rides in Denmark: Lessons from Improperly Generated Mobile Transport Tickets

The term security ceremony describes a technical system extended with its human users. In this paper, we examine the inspection ceremony for the mobile transport ticket in Denmark. We find several security weaknesses that are ascribable to both human and computer components of the ceremony. The main vulnerabilities are due to the design choices of how the visual inspection ceremony is organised...

متن کامل

Poster: Towards a Model for Analysing Anti-Phishing Authentication Ceremonies

Phishing uses both social engineering and technical means to carry out attacks. Therefore, human factors incorrect human trust decisions play an important role in phishing. Many online authentication techniques place a disproportional burden on human abilities. Assumptions made about human-protocol behaviour are often flawed. In our approach we use the concept of a ceremony to analyse and impro...

متن کامل

Trace of Water’s Footsteps on the History of Kashan

Traces of waters footsteps can rarely be found in history of Kashan. Traces which Sohrab Sepehri, a contemporary figure of Kashan, showed us and its meaning runs deep in our mythology. In this article, we believe that tracing water’s footsteps gives us a better source and description on the social history of this city. Based on the recent documents about Kashan, this essay finds an important cl...

متن کامل

بررسی تأثیر واکسن آنفلوانزا بر روی سندرم حاد تنفسی حجاج شهرستان ابهر در سال 1381

Background & Objectives: There are near two million people from around the world have planning to journey for Hadje ceremony. Old age, Crowding dormitory, close contact, poor sanitation, poor health services, different community pattern, high temperature and other factors cause the infectious diseases particularly respiratory infection more than ever Influenza occur more common and cause more d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2007  شماره 

صفحات  -

تاریخ انتشار 2007