Frequently, inventors of an attack desperately try to find reasons why the victim of the attack should have initiated a protocol run with an intruder when it is blatantly obvious that there is no intruder anywhere to be seen but there is a misbehaving insider. Security models where the antagonist is an insider are much more relevant tt,the electronic commerce scenario which today drives much work on security protocols and cryptography. This is another example of a general problem in security. Too often, the concepts used to discuss security do not fit the security issues we are trying to address.
机构:
European Commiss, Joint Res Ctr JRC, Directorate G Nucl Safety & Secur, Rue Champ Mars 21, B-1050 Brussels, BelgiumUniv Montpellier, DMRC, CEA, DES,ISEC, Marcoule, France