Show simple item record

Incentive-Centered Design for Information Security

dc.contributor.authorRick, Wash
dc.contributor.authorMacKie-Mason, Jeffrey K.
dc.date.accessioned2007-03-17T02:15:45Z
dc.date.available2007-03-17T02:15:45Z
dc.date.issued2006-07-31
dc.identifier.citationUSENIX Hot Topics in Security (HotSec 06), Vancouver, BC, 31 July 2006. <http://hdl.handle.net/2027.42/49505>en
dc.identifier.urihttps://hdl.handle.net/2027.42/49505
dc.description.abstractHumans are "smart components" in a system, but cannot be directly programmed to perform; rather, their autonomy must be respected as a design constraint and incentives provided to induce desired behavior. Sometimes these incentives are properly aligned, and the humans don't represent a vulnerability. But often, a misalignment of incentives causes a weakness in the system that can be exploited by clever attackers. Incentive-centered design tools help us understand these problems, and provide design principles to alleviate them. We describe incentive-centered design and some tools it provides. We provide a number of examples of security problems for which incentive- centered design might be helpful. We elaborate with a general screening model that offers strong design principles for a class of security problems.en
dc.format.extent134872 bytes
dc.format.mimetypeapplication/pdf
dc.language.isoen_USen
dc.titleIncentive-Centered Design for Information Securityen
dc.typeConference Paperen_US
dc.subject.hlbsecondlevelInformation and Library Science
dc.subject.hlbtoplevelSocial Sciences
dc.contributor.affiliationumInformation, School ofen
dc.contributor.affiliationumcampusAnn Arboren
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/49505/1/icd-security-position.pdfen_US
dc.owningcollnameInformation, School of (SI)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.