To boldly go where invention isn't secure: Applying security entrepreneurship to secure systems design

This source preferred by Shamal Faily

Authors: Faily, S. and Flechais, I.

Journal: NSPW ’10: Proceedings of the 2010 New Security Paradigms Workshop

Pages: 73-84

Publisher: ACM

Place of Publication: New York, NY, USA

This data was imported from DBLP:

Authors: Faily, S. and Flechais, I.

Editors: Keromytis, A.D., Peisert, S., Ford, R. and Gates, C.

http://doi.acm.org/10.1145/1900546

Journal: NSPW

Pages: 73-84

Publisher: ACM

ISBN: 978-1-4503-0415-3

DOI: 10.1145/1900546.1900557

This data was imported from Scopus:

Authors: Faily, S. and Flechais, I.

Journal: Proceedings New Security Paradigms Workshop

Pages: 73-83

ISBN: 9781450304153

DOI: 10.1145/1900546.1900557

When designing secure systems, we are inundated with an eclectic mix of security and non-security requirements; this makes predicting a successful outcome from the universe of possible security design decisions a difficult problem. We propose augmenting the process of security design with the paradigm of Security Entrepreneurship: the application of innovation models and principles to organise, create, and manage security design elements to bring about improved system security. We propose three initial Security Entrepreneurship techniques as examples of this paradigm, describe how their underlying models align with secure systems design, and help predict the social and technical impact of possible design decisions. We also pose a number of thought experiments, and suggest possible research agendas for Security Entrepreneurship. © 2010 ACM.

The data on this page was last updated at 04:43 on November 23, 2017.