【24h】

Invisible Security

机译:无形的安全

获取原文

摘要

In the last decades, digital security has gone through many theoretical breakthroughs, practical developments, worldwide deployments and subtle flaws in a continuous loop. It is mainly understood as a property of a technical system, which is eventually built as a tangible piece of technology for common people to use. It has therefore been assessed in terms of its correctness because it may easily go wrong, of its usability because it may be difficult to interact with, and of its economics because it may be inconvenient to deploy, maintain or re-deploy. In line with the theme "Evolving Security" of this year's Security Protocols Workshop, our view is that the shape of security as outlined above is in fact getting more and more multifaceted as we write. It was at the same event last year when we depicted an additional facet of security that is its being beautiful [1], namely inherently desirable for its users. Here, we further observe that security should be invisible in the sense that the user's perceived burden of complying with it be negligible. Through a few past, present and (advocated) future examples, this position paper supports invisibility as yet another desirable facet of security.
机译:在过去的几十年中,数字安全经历了许多理论突破,实际发展,全球部署和连续循环的微妙缺陷。它主要被理解为一种技术系统的财产,最终建立了普通人使用的有形技术。因此,它已经在其正确性方面进行了评估,因为它可能很容易出错,其可用性,因为它可能很难与其经济学互动,因为它可能是部署,维护或重新部署的不方便。符合今年安全协议研讨会的“不断发展的安全性”,我们的观点是,如上所述的安全形式实际上是越来越多的多方面。去年我们在我们描绘了一个安全的额外方面,这是它是美丽的[1]的额外方面,即固有的用户。在这里,我们进一步观察到,安全性应该是看不见的,即用户对其遵守它的感知负担可以忽略不计。通过一些过去,现在和(倡导)未来的例子,这个立场纸支持了尚未成为安全的尚未理想的方面。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号