Insider fraud

被引:0
|
作者
Gollmann, D [1 ]
机构
[1] Microsoft Res Ltd, Cambridge, England
来源
SECURITY PROTOCOLS | 1999年 / 1550卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Frequently, inventors of an attack desperately try to find reasons why the victim of the attack should have initiated a protocol run with an intruder when it is blatantly obvious that there is no intruder anywhere to be seen but there is a misbehaving insider. Security models where the antagonist is an insider are much more relevant tt,the electronic commerce scenario which today drives much work on security protocols and cryptography. This is another example of a general problem in security. Too often, the concepts used to discuss security do not fit the security issues we are trying to address.
引用
下载
收藏
页码:213 / 226
页数:14
相关论文
共 50 条
  • [31] The 'insider'
    Barra, A
    AMERICAN HERITAGE, 2004, 55 (06) : 73 - 73
  • [32] The Insider
    Blau, Danielle
    LITERARY REVIEW, 2011, 55 (01) : 13 - 13
  • [33] The insider
    Boorstin, J
    FORTUNE, 2001, 143 (06) : 197 - 197
  • [34] The 'Insider'
    Kermode, M
    SIGHT AND SOUND, 2000, 10 (03): : 46 - 47
  • [35] The Insider
    Kelley, Kitty
    NEW YORK TIMES BOOK REVIEW, 2020, 125 : 6 - 6
  • [36] The insider
    Schoenberger, CR
    FORBES, 2004, 173 (10): : 82 - 84
  • [37] 'INSIDER'
    DAY, A
    SOUTH DAKOTA REVIEW, 1978, 16 (02): : 56 - 56
  • [38] Edmund Phelps, insider-economists' insider
    Samuelson, PA
    KNOWLEDGE, INFORMATION, AND EXPECTATION IN MODERN MACROECONOMICS: IN HONOR OF EDMUND S. PHELPS, 2003, : 1 - 2
  • [39] The insider
    Derek Lowe
    Nature Chemistry, 2009, 1 (2) : 99 - 99
  • [40] INSIDER
    Roudil, Daniele
    Aldave de las Heras, Laura
    EPJ NUCLEAR SCIENCES & TECHNOLOGIES, 2020, 6