CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Pricing via Processing or Combatting Junk Mail
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Curbing Junk E-Mail via Secure Classification
FC '98 Proceedings of the Second International Conference on Financial Cryptography
A pseudonymous communications infrastructure for the internet
A pseudonymous communications infrastructure for the internet
Labeling images with a computer game
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Moderately hard, memory-bound functions
ACM Transactions on Internet Technology (TOIT)
Fighting Spam with Reputation Systems
Queue - Social Computing
Implementing and testing a virus throttle
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
CAPTCHA: using hard AI problems for security
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Hi-index | 0.00 |
Humans are "smart components" in a system, but cannot be directly programmed to perform; rather, their autonomy must be respected as a design constraint and incentives provided to induce desired behavior. Sometimes these incentives are properly aligned, and the humans don't represent a vulnerability. But often, a misalignment of incentives causes a weakness in the system that can be exploited by clever attackers. Incentive-centered design tools help us understand these problems, and provide design principles to alleviate them. We describe incentive-centered design and some tools it provides. We provide a number of examples of security problems for which Incentive Centered Design might be helpful. We elaborate with a general screening model that offers strong design principles for a class of security problems.