Insider fraud

被引:0
|
作者
Gollmann, D [1 ]
机构
[1] Microsoft Res Ltd, Cambridge, England
来源
SECURITY PROTOCOLS | 1999年 / 1550卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Frequently, inventors of an attack desperately try to find reasons why the victim of the attack should have initiated a protocol run with an intruder when it is blatantly obvious that there is no intruder anywhere to be seen but there is a misbehaving insider. Security models where the antagonist is an insider are much more relevant tt,the electronic commerce scenario which today drives much work on security protocols and cryptography. This is another example of a general problem in security. Too often, the concepts used to discuss security do not fit the security issues we are trying to address.
引用
下载
收藏
页码:213 / 226
页数:14
相关论文
共 50 条