Two-factor authentication: too little, too late
Communications of the ACM - Transforming China
Active CyberCode: a directly controllable 2D code
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Rock Band: a case study in the design of embodied interface experience
Proceedings of the 2009 ACM SIGGRAPH Symposium on Video Games
Guest Editors' Introduction: Securing Online Games: Safeguarding the Future of Software Security
IEEE Security and Privacy
Japan's Arcade Games and Their Technology
ICEC '09 Proceedings of the 8th International Conference on Entertainment Computing
Hi-index | 0.00 |
Online game security is often discussed, but, in game development, security factors are tend to be an afterthought. It is helpful to consider the unique perspectives of the game designer, security engineer, and game player all together in the game development process. In this paper, we present a framework for a formal approach to understand the security interface. We also try to integrate different perspectives when analyzing cases which use a hardware security token for online games. This interface-level analysis of security attempts to achieve two goals: Firstly, to make the security in online gaming not merely an add-on feature but an integrated part of game development. Secondly, to bridge the gap between game design and security technology and allow the game designer and security engineer to collaborate toward their particular goals.