In the last decade, computer science researchers have beenworking hard to prevent attacks against the security ofinformation systems. Different adversary models haveincarnated the malicious entities against which researchershave defined security properties, identified securityvulnerabilities, and engineered security defenses. Theseadversaries were usually intruders, that is, outsiders tryingto break into a system’s defenses.
展开▼