DocumentCode :
180638
Title :
Modelling User Devices in Security Ceremonies
Author :
Martimiano, Taciane ; Everson Martina, Jean ; Maina Olembo, M. ; Carlomagno Carlos, Marcelo
Author_Institution :
Dept. de Inf. e de Estatistica, Univ. Fed. de Santa Catarina, Florianopolis, Brazil
fYear :
2014
fDate :
18-18 July 2014
Firstpage :
16
Lastpage :
23
Abstract :
User constrained devices such as smart cards are commonly used in human-protocol interaction. Modelling these devices as part of human-protocol interaction is still an open problem. Examining the interaction of these devices as part of security ceremonies offers greater insight. This paper highlights two such cases: modelling extra channels between humans and devices in the ceremony, and modelling possession when the device also acts as an agent in the ceremony. Case studies where such devices are used during authentication ceremonies are presented to demonstrate these use cases.
Keywords :
authorisation; cryptographic protocols; smart cards; authentication ceremonies; human-protocol interaction; modelling possession; security ceremonies; smart cards; user constrained devices; user device modelling; Authentication; Computational modeling; Computers; Generators; Protocols; Smart cards; Security Ceremonies; Security Protocols; Threat models;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Socio-Technical Aspects in Security and Trust (STAST), 2014 Workshop on
Conference_Location :
Vienna
Type :
conf
DOI :
10.1109/STAST.2014.11
Filename :
6978925
Link To Document :
بازگشت