The Value of User-Visible Internet Cryptography

作者: Richard F. Paige , Phillip J. Brooke

DOI:

关键词: Asset managementContext (language use)Value (ethics)Computer scienceWorld Wide WebComputer securityCryptographyThe Internet

摘要: Cryptographic mechanisms are used in a wide range of applications, including email clients, web browsers, document and asset management systems, where typical users not cryptography experts. A number empirical studies have demonstrated that explicit, user-visible cryptographic widely by non-expert users, as result arguments been made need to be better hidden or embedded end-user processes tools. Other mechanisms, such HTTPS, built-in only become visible the user when dialogue appears due (potential) problem. This paper surveys deployed potential technologies use, examines social legal context broad classes from there, assesses value issues for those users.

参考文章(45)
Iacovos Kirlappos, M. Angela Sasse, Nigel Harvey, Why trust seals don't work: a study of user perceptions and behavior trust and trustworthy computing. pp. 308- 324 ,(2012) , 10.1007/978-3-642-30921-2_18
Frank Stajano, Pico: No More Passwords! Security Protocols XIX. pp. 49- 81 ,(2011) , 10.1007/978-3-642-25867-1_6
Peter Gutmann, Plug-and-play PKI: a PKI your mother can use usenix security symposium. pp. 4- 4 ,(2003)
Lorrie Faith Cranor, Simson Garfinkel, None, Security and Usability: Designing Secure Systems that People Can Use ,(2005)
Tobias Straub, Harald Baier, A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications Public Key Infrastructure. pp. 112- 125 ,(2004) , 10.1007/978-3-540-25980-0_9
Haitham S. Al-Sinani, Chris J. Mitchell, A universal client-based identity management tool european public key infrastructure workshop. pp. 49- 74 ,(2011) , 10.1007/978-3-642-29804-2_4
Tarik Ibrahim, Steven M. Furnell, Maria Papadaki, Nathan L. Clarke, Assessing the usability of end-user security software trust and privacy in digital business. pp. 177- 189 ,(2010) , 10.1007/978-3-642-15152-1_16
Jeongmo Yang, Colin Boyd, Ed Dawson, Byoungcheon Lee, Kwangjo Kim, Seungjae Yoo, Secure key issuing in ID-based cryptography ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32. pp. 69- 74 ,(2004)