Insider Fraud (Position Paper)

  • Authors:
  • Dieter Gollmann

  • Affiliations:
  • -

  • Venue:
  • Proceedings of the 6th International Workshop on Security Protocols
  • Year:
  • 1998

Quantified Score

Hi-index 0.00

Visualization

Abstract

Frequently, inventors of an attack desperately try to find reasons why the victim of the attack should have initiated a protocol run with an intruder when it is blatantly obvious that there is no intruder anywhere to be seen but there is a misbehaving insider. Security models where the antagonist is an insider are much more relevant to the electronic commerce scenario which today drives much work on security protocols and cryptography. This is another example of a general problem in security. Too often, the concepts used to discuss security do not fit the security issues we are trying to address.