Accountability protocols: Formalized and verified
ACM Transactions on Information and System Security (TISSEC)
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Communications of the ACM - Organic user interfaces
Privacy and security: Usable security: how to get it
Communications of the ACM - Scratch Programming for All
Towards a theory of accountability and audit
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Privacy in Context: Technology, Policy, and the Integrity of Social Life
Privacy in Context: Technology, Policy, and the Integrity of Social Life
Dissent: accountable anonymous group messaging
Proceedings of the 17th ACM conference on Computer and communications security
Accountability: definition and relationship to verifiability
Proceedings of the 17th ACM conference on Computer and communications security
Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies
Hi-index | 0.00 |
The standard technical approach to privacy and security in online life is preventive: Before someone can access confidential data or take any other action that implicates privacy or security, he should be required to prove that he is authorized to do so. As the scale and complexity of online activity has grown, it has become apparent that the preventive approach is inadequate; thus, a growing set of information-security researchers has embraced greater reliance on accountability mechanisms to complement preventive measures. Despite widespread agreement that "accountability" is important in online life, the term has no standard definition. We make three contributions to the study of accountability: (1) We flesh out with realistic examples our claim that a purely preventive approach to security is inadequate; (2) We present, compare, and contrast some existing formal frameworks for accountability; (3) We explore the question of whether "deterrence" may be a better general term in this context than "accountability."