FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Usability: Def. and Aims The ease of use and learnability of a human-made object. [Wikipedia] (accessed in 2010) Should also aim to prevent user errors Or at least to decrease likelihood or severity of user errors, which may lead to • system failure • catastrophic consequences A. Cerone, UNU-IIST – p.12/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Usability vs. Security A. Cerone, UNU-IIST – p.13/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Usability vs. Security • Usable Security • security mechanisms may decrease usability A. Cerone, UNU-IIST – p.13/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Usability vs. Security • Usable Security • security mechanisms may decrease usability • Secure Usability A. Cerone, UNU-IIST – p.13/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Usability vs. Security • Usable Security • security mechanisms may decrease usability • Secure Usability • poor usability decrease security A. Cerone, UNU-IIST – p.13/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Usability vs. Security • Usable Security • security mechanisms may decrease usability • Secure Usability • poor usability decrease security • usability should increase security A. Cerone, UNU-IIST – p.13/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Usability vs. Security • Usable Security • security mechanisms may decrease usability • Secure Usability • poor usability decrease security • usability should increase security • usability may decrease security A. Cerone, UNU-IIST – p.13/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Usability vs. Security • Usable Security • security mechanisms may decrease usability • Secure Usability • poor usability decrease security • usability should increase security • usability may decrease security = ⇒ security mechanisms may decrease usability = ⇒ poor usability = ⇒ decrease security A. Cerone, UNU-IIST – p.13/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Usability vs. Security • Usable Security • security mechanisms may decrease usability • Secure Usability • poor usability decrease security • usability should increase security • usability may decrease security = ⇒ security mechanisms may decrease usability = ⇒ poor usability = ⇒ decrease security = ⇒ security mechanisms may decrease security A. Cerone, UNU-IIST – p.13/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Groupware Case Study A. Cerone, UNU-IIST – p.14/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Groupware Term for applications written to implement • Computer-supported cooperative work (CSWC) A. Cerone, UNU-IIST – p.15/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Groupware Term for applications written to implement • Computer-supported cooperative work (CSWC) HCI = ⇒ single user multidisciplinary around axis psychology–computing A. Cerone, UNU-IIST – p.15/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Groupware Term for applications written to implement • Computer-supported cooperative work (CSWC) HCI = ⇒ single user multidisciplinary around axis psychology–computing CSWC = ⇒ group of users multidisciplinary around axis sociolology–computing A. Cerone, UNU-IIST – p.15/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Groupware Term for applications written to implement • Computer-supported cooperative work (CSWC) HCI = ⇒ single user multidisciplinary around axis psychology–computing CSWC = ⇒ group of users multidisciplinary around axis sociolology–computing = ⇒ security issues A. Cerone, UNU-IIST – p.15/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Case Study: Web Interface A conference support web-basd tool that • provides information on the event • establishes a community via registration • enables users to share their ideas, interests, etc. via discussion forum • facilitates communication between users via creation of personal profiles A. Cerone, UNU-IIST – p.16/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Web Design Home Forum User Profiles Message Profile A. Cerone, UNU-IIST – p.17/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Web Pages • Home to provide general information and materials about the conference and to set up own profile • Forum to browse posted messages and to post new messages • Message to analyse a posted message (possibly looking at the sender’s profile), and post a reply to it • User Profiles to browse users’ profiles • Profile to analyse other users’profiles (possibly looking at the messages they sent), and contact matching users A. Cerone, UNU-IIST – p.18/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Web Interface Entry logout enter forum users post Forum Home User Profiles home home forum read-message back-to-forum back-to-users setup-profile read-profile users read-profile reply contact Message Profile read-message A. Cerone, UNU-IIST – p.19/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References User Privileges OutUser t logout u o g o login l no-profile p r o fi l e InUser Member setup-profile read-message read-message read-profile read-profile post reply contact A. Cerone, UNU-IIST – p.20/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Interface enter read-message OutUser Entry read-profile post reply forum no-profile home logout profile users contact back-to-users setup-profile back-to-forum OutUser � Entry A. Cerone, UNU-IIST – p.21/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References User Behaviour User: A conference participant Scenario: The persona tries to • gather information • find/contact other users • express his/her ideas using the website. A. Cerone, UNU-IIST – p.22/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References User Goal Gather In- formation gather achieved achieved login Establish Goal establish Goals Contact Achieved express achieved Express Ideas A. Cerone, UNU-IIST – p.23/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References User Goal logout Gather In- formation gather achieved gather achieved login Establish Goal establish Goals Contact Achieved express establish achieved express Express Ideas A. Cerone, UNU-IIST – p.23/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References User Goal logout Gather In- formation gather achieved gather achieved login Establish Goal establish Goals Contact Achieved express establish achieved express Express unattended Ideas unattended long-delay short-delay Unauthorised A. Cerone, UNU-IIST – p.23/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Establish Contact logout g a t h r e e h r t a g achieved l o g i n Establish Goal establish Goals Contact Achieved establish e x p r e s express s unattended unattended long-delay short-delay Unauthorised A. Cerone, UNU-IIST – p.24/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Establish Contact logout read-message g a t h r e e read-profile h r t a g contact achieved l o g i n Establish Goal establish Goals Contact Achieved establish e x p r e s express s failure logout unattended unattended long-delay short-delay Unauthorised A. Cerone, UNU-IIST – p.24/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References The Overall System enter login read-message read-message OutUser Entry Goals read-profile read-profile post post gather reply forum reply establish no-profile home express logout logout profile users leave contact contact back-to-users short-delay setup-profile failure back-to-forum long-delay SYSTEM = ( OutUser [| ... |] Entry ) [| { login , ... , failure } |] Goals A. Cerone, UNU-IIST – p.25/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Group of Users Interaction Aspects • local group of users interacting with a single shared interface rather than distributed group of users interacting among each other through the system A. Cerone, UNU-IIST – p.26/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Group of Users Interaction Aspects • local group of users interacting with a single shared interface rather than distributed group of users interacting among each other through the system • sequence of users A. Cerone, UNU-IIST – p.26/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Group of Users Interaction Aspects • local group of users interacting with a single shared interface rather than distributed group of users interacting among each other through the system • sequence of users Security Aspects • distinct users may have different privileges A. Cerone, UNU-IIST – p.26/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Group of Users Interaction Aspects • local group of users interacting with a single shared interface rather than distributed group of users interacting among each other through the system • sequence of users Security Aspects • distinct users may have different privileges • users may act as authorised or unauthorised A. Cerone, UNU-IIST – p.26/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Authorised vs. Unauthorised Actions are attempted and may result in • either success • or failure A. Cerone, UNU-IIST – p.27/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Authorised vs. Unauthorised Actions are attempted and may result in • either success • or failure Authorised User • is supposted to result in success Unauthorised User • is supposted to result in failure A. Cerone, UNU-IIST – p.27/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References User Goal logout Gather In- formation gather achieved gather achieved login Establish Goal establish Goals Contact Achieved express establish achieved express Express unattended Ideas unattended long-delay short-delay Unauthorised A. Cerone, UNU-IIST – p.28/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Strong Security The property of strong security is expressed as follows If the goal is achieved then user actions • either never result in success (unauthorised user) • or do not result in success until the user establish a new goal or performs a logout (authorised user) A. Cerone, UNU-IIST – p.29/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Strong Security The property of strong security is expressed as follows If the goal is achieved then user actions • either never result in success (unauthorised user) • or do not result in success until the user establish a new goal or performs a logout (authorised user) ✷ achieved → ( ¬ success W ( goal ∨ logout )) A. Cerone, UNU-IIST – p.29/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Authorised o u t l o g Gather In- formation r achieved e h t a g gather achieved g o a l Establish Goal establish Authorised Contact Achieved express establish achieved express Express login unattended Ideas unattended User long-delay short-delay Unauthorised A. Cerone, UNU-IIST – p.30/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Unauthorised User unattended User long-delay short-delay read-message logout read-profile Unauthorised post reply contact success failure A. Cerone, UNU-IIST – p.31/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Non Expert User logout back-to-forum achieved back-to-users NonExpert home users unattended forum unattended logout A. Cerone, UNU-IIST – p.32/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References NonForgetful Users logout back-to-forum achieved back-to-users NonExpert home users unattended forum unattended logout logout logout achieved NonForgetful A. Cerone, UNU-IIST – p.33/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References NonForgetful Users logout back-to-forum achieved back-to-users NonExpert home users unattended forum unattended logout logout logout achieved NonForgetful ( SYSTEM � NonExpert ) [| { achieved, logout, unattended } |] NonForgetful A. Cerone, UNU-IIST – p.33/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References NonForgetful Users logout back-to-forum achieved back-to-users NonExpert home users unattended forum unattended logout logout logout achieved NonForgetful ( SYSTEM � NonExpert ) [| { achieved, logout, unattended } |] NonForgetful • The property does not hold! A. Cerone, UNU-IIST – p.33/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Web Interface Entry logout enter forum users post Forum Home User Profiles home home forum read-message back-to-forum back-to-users setup-profile read-profile users read-profile reply contact Message Profile read-message A. Cerone, UNU-IIST – p.34/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Expertise logout back-to-users back-to-forum achieved back-to-users Expert home users back-to-forum unattended forum unattended home logout logout home ( SYSTEM � Expert ) A. Cerone, UNU-IIST – p.35/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Expertise logout back-to-forum achieved back-to-users NonExpert home users unattended forum unattended logout ( SYSTEM � NonExpert ) A. Cerone, UNU-IIST – p.35/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Web Interface Entry logout enter forum users post Forum Home User Profiles home home forum read-message back-to-forum back-to-users setup-profile read-profile users read-profile reply contact Message Profile read-message A. Cerone, UNU-IIST – p.36/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Web Interface 1 Entry logout enter forum users post Forum Home User Profiles home home forum read-message back-to-forum back-to-users setup-profile read-profile users read-profile reply contact Message Profile read-message A. Cerone, UNU-IIST – p.37/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Web Interface 1 Entry logout enter forum users post Forum Home User Profiles home home forum read-message back-to-forum back-to-users setup-profile read-profile users read-profile reply contact Message Profile read-message A. Cerone, UNU-IIST – p.37/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Web Interface 2 Entry logout logout logout enter forum users post Forum Home User Profiles home home forum read-message back-to-forum back-to-users setup-profile read-profile users read-profile reply contact Message Profile read-message A. Cerone, UNU-IIST – p.38/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Web Interface 2 Entry logout logout logout enter forum users post Forum Home User Profiles home home forum read-message back-to-forum back-to-users setup-profile read-profile users read-profile reply contact Message Profile read-message The property • holds on ( ( SYSTEM � NonExpert ) [| ... |] NonForgetful ) • does not hold on ( SYSTEM � NonExpert ) A. Cerone, UNU-IIST – p.38/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Web Interface 3 Entry short-delay short-delay logout enter forum users post Forum Home User Profiles home home forum read-message back-to-forum back-to-users setup-profile read-profile users logout read-profile reply contact Message Profile read-message long-delay short-delay short-delay timeout A. Cerone, UNU-IIST – p.39/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Quick Timeout Assumption: No authorised user may enter an unattended session within a time period shorter (short-delay) than the delay (long-delay) that triggers the timeout A. Cerone, UNU-IIST – p.40/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Quick Timeout Assumption: No authorised user may enter an unattended session within a time period shorter (short-delay) than the delay (long-delay) that triggers the timeout back-to-forum long-delay Quick timeout back-to-users Timeout home users logout forum logout A. Cerone, UNU-IIST – p.40/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Quick Timeout Assumption: No authorised user may enter an unattended session within a time period shorter (short-delay) than the delay (long-delay) that triggers the timeout back-to-forum long-delay Quick timeout back-to-users Timeout home users logout forum logout The property • holds on ( ( SYSTEM � NonExpert ) [| ... short-delay ... |] QuickTimeout ) • does not hold on ( SYSTEM � NonExpert ) A. Cerone, UNU-IIST – p.40/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Violation Prevention Previous safeguards just reduce the likelihood of security violations A. Cerone, UNU-IIST – p.41/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Violation Prevention Previous safeguards just reduce the likelihood of security violations Can we introduce a mechanism to prevent any unauthorised user entering an unattended session from performing interactions with the system? A. Cerone, UNU-IIST – p.41/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Violation Prevention Previous safeguards just reduce the likelihood of security violations Can we introduce a mechanism to prevent any unauthorised user entering an unattended session from performing interactions with the system? What about avoiding • masquerading threats A. Cerone, UNU-IIST – p.41/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Violation Prevention Previous safeguards just reduce the likelihood of security violations Can we introduce a mechanism to prevent any unauthorised user entering an unattended session from performing interactions with the system? What about avoiding • masquerading threats • confidentiality threats A. Cerone, UNU-IIST – p.41/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Violation Prevention Previous safeguards just reduce the likelihood of security violations Can we introduce a mechanism to prevent any unauthorised user entering an unattended session from performing interactions with the system? What about avoiding • masquerading threats • confidentiality threats • both masquerading and confidentiality threats A. Cerone, UNU-IIST – p.41/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Web Interface 4 authenticated Entry s u c f c a i e l u r logout s enter e s post forum users Forum Home User Profiles home home forum read-message back-to-forum back-to-users setup-profile read-profile users read-profile contact Message Profile y l p read-message e r failure failure success s u c c e s s authenticated a u t h e n t i c a t A. Cerone, UNU-IIST – p.42/52 e d
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References More Security Properties Does the previous property guarantee the absence of masquerading and/or confidentiality threats? A. Cerone, UNU-IIST – p.43/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References More Security Properties Does the previous property guarantee the absence of masquerading and/or confidentiality threats? Yes!! Does it hold on System 4? A. Cerone, UNU-IIST – p.43/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References More Security Properties Does the previous property guarantee the absence of masquerading and/or confidentiality threats? Yes!! Does it hold on System 4? No! Why? A. Cerone, UNU-IIST – p.43/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References More Security Properties Does the previous property guarantee the absence of masquerading and/or confidentiality threats? Yes!! Does it hold on System 4? No! Why? Too strong! A. Cerone, UNU-IIST – p.43/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References More Security Properties Does the previous property guarantee the absence of masquerading and/or confidentiality threats? Yes!! Does it hold on System 4? No! Why? Too strong! • masquerading prevention ✷ ( unattended → ¬ ( set-up ∨ contact ∨ post ∨ reply ) W logout ) A. Cerone, UNU-IIST – p.43/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References More Security Properties Does the previous property guarantee the absence of masquerading and/or confidentiality threats? Yes!! Does it hold on System 4? No! Why? Too strong! • masquerading prevention ✷ ( unattended → ¬ ( set-up ∨ contact ∨ post ∨ reply ) W logout ) • confidentiality ✷ ( unattended → ¬ ( read-profile ∨ read-message ) W logout ) A. Cerone, UNU-IIST – p.43/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Authentication Assumption: Only authorised users can be authenticated A. Cerone, UNU-IIST – p.44/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Authentication Assumption: Only authorised users can be authenticated leave failure Authorised UnAuthorised failure logout authenticated ( ( SYSTEM � NonExpert ) � Authorised ) • The following property holds ✷ ( achieved → ¬ success U ( goal ∨ logout )) A. Cerone, UNU-IIST – p.44/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Authentication Assumption: Only authorised users can be authenticated leave failure Authorised UnAuthorised failure logout authenticated ( ( SYSTEM � NonExpert ) � Authorised ) • If authentication is on read-message and read-profile then the following property holds ✷ ( unattended → ¬ ( read-profile ∨ read-message ) W logout ) A. Cerone, UNU-IIST – p.44/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Strong Property Expertise NonForgetful Quick Timeout ( User ) ( User ) ( Web Interface ) Interface 1 FALSE FALSE + NonExpert FALSE TRUE + Expert Interface 2 - logout FALSE TRUE + NonExpert FALSE TRUE + Expert Interface 3 - timeout FALSE TRUE + NonExpert FALSE TRUE + Expert A. Cerone, UNU-IIST – p.45/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Other Properties never-masquerading confidentiality FALSE FALSE Interface 4 - contact, post, reply TRUE FALSE (!) + Authorised FALSE FALSE Interface 5 - read-message, read-profile FALSE (!) TRUE + Authorised FALSE FALSE Interface 6 - all above actions TRUE TRUE + Authorised ✷ ( unattended → ¬ ( set-up ∨ contact ∨ post ∨ reply ) W logout ) ✷ ( unattended → ¬ ( read-profile ∨ read-message ) W logout ) A. Cerone, UNU-IIST – p.46/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Intrusion The user model is based that • single user view • only honest goals A. Cerone, UNU-IIST – p.47/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Intrusion The user model is based that • single user view • only honest goals Cleaner approach • intrusion goal (dishonest goal) A. Cerone, UNU-IIST – p.47/52
FMAIS 5 — Pisa, Italy, 21 December 2010 Contents | Cognitive Errors | Usability and Security | Groupware | References Intrusion The user model is based that • single user view • only honest goals Cleaner approach • intrusion goal (dishonest goal) • masquerading goal • breaking confidentiality goal A. Cerone, UNU-IIST – p.47/52
Recommend
More recommend