Information Security Decision Making

advertisement
Newcastle, UK March 9, 2010
Trust Economics
Aad van Moorsel
Newcastle University, UK
aad.vanmoorsel@ncl.ac.uk
outline (in randomized order)
1. trust economics methodology
2. the research parts:
• soliciting human, technical and business aspects
• models
• ontologies
• user interfaces
3. examples
• passwords and compliance budget
• digital rights management
• access management
© Aad van Moorsel, Newcastle University, 2010
2
trust economics methodology
trust economics methodology for security decisions
trade off:
legal issues,
human tendencies,
business concerns,
...
a model
of the information
system
© Aad van Moorsel, Newcastle University, 2010
stakeholders
discuss
4
trust economics research
from the trust economics methodology, the following
research follows:
1. identify human, business and technical concerns
2. develop and apply mathematical modelling
techniques
3. glue concerns, models and presentation together using
a trust economics information security ontology
4. use the models to improve the stakeholders discourse
and decisions
© Aad van Moorsel, Newcastle University, 2010
5
our involvement
1.
–
2.
–
–
3.
–
–
–
4.
–
identify human, business and technical concerns
are working on a case study in Access Management (Maciej, James, with
Geoff and Hilary from Bath)
develop and apply mathematical modelling techniques
are generalising concepts to model human behaviour, and are validating it
with data collection (Rob, Simon, with Doug, Robin and Bill from UIUC)
do a modelling case study in DRM (Wen)
glue concerns, models and presentation together using a trust economics
information security ontology
developed an information security ontology, taking into account human
behavioural aspect (Simon)
made an ontology editing tool for CISOs (John)
are working on a collaborative web-based tool (John, Simon, Stefan from
SBA, Austria)
use the models to improve the stakeholders discourse and decision
using participatory design methodology, are working with CISOs to do a user
study (Simon, Philip and Angela from UCL)
© Aad van Moorsel, Newcastle University, 2010
6
example of the trust economics methodology
passwords
Information Security Management
Find out about how users behave, what the business issues
are:
CISO1: Transport is a big deal.
Interviewer1: We’re trying to recognise this in our user classes.
CISO1: We have engineers on the road, have lots of access, and are more gifted in
IT.
Interviewer1: Do you think it would be useful to configure different user
classes?
CISO1: I think it’s covered.
Interviewer1: And different values, different possible consequences if a loss
occurs. I’m assuming you would want to be able to configure.
CISO1: Yes. Eg. customer list might or might not be very valuable.
Interviewer1: And be able to configure links with different user classes and the
assets.
CISO1: Yes, if you could, absolutely.
Interviewer1: We’re going to stick with defaults at first and allow configuration
if needed later. So, the costs of the password policy: running costs, helpdesk
staff, trade-off of helpdesk vs. productivity
CISO1: That’s right.
© Aad van Moorsel, Newcastle University, 2010
8
Information Security Management
Find out about how users behave, what the business issues
are:
Discussion of "Productivity Losses":
CISO2: But it’s proportional to amount they earn. This is productivity. eg. $1m
salary but bring $20m into the company. There are expense people and
productivity people.
Interviewer1: We have execs, “road warrior”, office drone. Drones are just a
cost.
Interviewer2: And the 3 groups have different threat scenarios.
CISO2: Risk of over-complicating it, hard to work out who is income-earner and
what proportion is income earning.
Interviewer2: But this is good point.
CISO2: Make it parameterisable, at choice of CISO.
…
CISO2: So, need to be able to drill down into productivity, cost, - esp in small
company.
© Aad van Moorsel, Newcastle University, 2010
9
a model of the IT system
10
Password Policy Composition Tool
File
Help
Breaches / Productivity / Cost
tool to communicate
the result to a CISO
[projected per annum for 100-user sample]
BREACHES
#
Full
#
Composite
#
Partial
#
Productivity
#
Costs
#
BREACHES:
Composite
Policy Properties
ss 3 350
Cla
Cla
ss 1 280
Cla
Password Change Notification:
#upper
i
upper
#upper
#
#min_length
#upper
i
#notif_days
#lower
#lower
Password Login Attempts:
Password Complexity:
i
#upper
#
#
ss 2 175
No.
ss 3 350
Cla
Organisation Properties User Properties
Password Length:
upper
#upper
#
Partial
Cla
ss 2 175
ss 1 280
Cla
Cla
ss 3 350
ss 2 175
Cla
Cla
ss 1 280
No.
No.
Full
i
#upper
char_classes
max_retries
#
lower
#
lower
Password Change Frequency:
#upper
i
#change_frequency
#lower
Generate Output
Export Policy
an information security
ontology incorporating
human-behavioural implications
Simon Parkin, Aad van Moorsel
Newcastle University, UK
Robert Coles,
Bank of America Merrill Lynch
trust economics ontology
• we want to have a set of tools that implement the trust
economics methodology
• needs to work for different case studies
• need a way to represent, maintain and interrelate relevant
information
• glue between
– problem space: technical, human, business
– models
– interfaces
© Aad van Moorsel, Newcastle University, 2010
13
Using an Ontology
• We chose to use an ontology to address these
requirements, because:
– An ontology helps to formally define concepts and
taxonomies
– An ontology serves as a means to share knowledge
• Potentially across different disciplines
– An ontology can relate fragments of knowledge
• Identify interdependencies
© Aad van Moorsel, Newcastle University, 2010
14
Business, Behaviour and Security
• Example: Password Management
– There is a need to balance security and ease-of-use
– A complex password may be hard to crack, but might
also be hard to remember
• Is there a way to:
– Identify our choices in these situations?
– Consider the potential outcomes of our choices in a
reasoned manner?
© Aad van Moorsel, Newcastle University, 2010
15
Requirements
• Standards should be represented
– Information security mechanisms are guided by policies, which are increasingly
informed by standards
• The usability and security behaviours of staff must be considered
–
–
–
–
Information assets being accessed;
The vulnerabilities that users create;
The intentional or unintentional threats user actions pose, and;
The potential process controls that may be used and their identifiable effects
• CISOs must be able to relate ontology content to the security infrastructure
they manage
– Representation of human factors and external standards should be clear,
unambiguous, and illustrate interdependencies
© Aad van Moorsel, Newcastle University, 2010
16
Information Security Ontology
• We created an ontology to represent the human-behavioural implications of
information security management decisions
– Makes the potential human-behavioural implications visible and comparable
• Ontology content is aligned with information security management guidelines
– We chose the ISO27002: “Code of Practice” standard
– Provides a familiar context for information security managers (e.g. CISOs, CIOs,
etc.)
– Formalised content is encoded in the Web Ontology Language (OWL)
• Human factors researchers and CISOs can contribute expertise within an
ontology framework that connects their respective domains of knowledge
– Input from industrial partners and human factors researchers helps to make the
ontology relevant and useful to prospective users
© Aad van Moorsel, Newcastle University, 2010
17
Ontology - Overview
Infra.
Chapter
Proc.
1
1
hasFoundation
Behavioural
Foundation
Threat
exploitedBy
1
1
managesRiskOf
contains
*
*
Behaviour
Control
Section
1
*
*
hasRiskApproach
1
*
Guideline
Control Type
1
*
hasVulnerability
hasStakeholder
Vulnerability
*
hasSubject
contains
*
Guideline
Step
1
isMitigatedBy
contains
1
1
*
*
hasSubject
*
hasVulnerability
1
*
Asset
1
1
1
ownedBy
© Aad van Moorsel, Newcastle University, 2010
Role
18
Ontology – Password Policy Example
Chapter
Single Password Memorisation
Difficult
Number: 11
Name: “ Access Control”
hasVulnerability
Section
Number: 11.3
Name: “User Responsibilities”
Objective: ...
Password
Guideline
Number: 11.3.1
Name: “Password Use”
Control: ...
Implementation Guidance (Additional): ...
Other Information: ...
hasSubject
Implementation Guidance Step
Number: 11.3.1 (d)
Guidance: “select quality passwords with sufficient minimum length which are:
1) easy to remember;
...”
© Aad van Moorsel, Newcastle University, 2010
19
Example – Password Memorisation
KEY
Classes
Vulnerability
Procedural Threat
Single Password Memorisation
Difficult
Acceptance
Capability
Maintain Password
Policy
Single Password
Forgotten
Behavioural Foundation
Infrastructure Threat
Behaviour Control
Asset
Control Type
User temporarily without access
Reduction
Make Password Easier
To Remember
Threat Consequence
Relationships
mitigated by
has vulnerability
exploited by
manages risk of
© Aad van Moorsel, Newcastle University, 2010
20
Example – Recall Methods
Single Password Memorisation
Difficult
KEY
Classes
Vulnerability
Procedural Threat
Behavioural Foundation
Reduction
Educate Users in
Recall Techniques
Infrastructure Threat
Behaviour Control
Asset
Mindset
Password Stored Externally
to Avoid Recall
Insecure storage medium can
be exploited by malicious party
Control Type
Threat Consequence
Relationships
mitigated by
has vulnerability
Reduction
Implement ISO27002 Guideline 11.3.1 (b),
“avoid keeping a record of passwords”
© Aad van Moorsel, Newcastle University, 2010
exploited by
manages risk of
21
Example – Password Reset Function
Single Password Memorisation
Difficult
Transfer
Helpdesk Password
Reset Management
User temporarily without access
Capability
Reduction
Helpdesk Provided With
Identity Verification Details
Single Password
Forgotten
Password Reset Process
Laborious
Automated Password
Reset System
Temporal
Mindset
Helpdesk Busy
Employee Becomes
Impatient
User compliance diminished
Reduction
User Account
Details Stolen
Malicious party gains access
IT Helpdesk Cannot
Satisfy Reset Request
Additional Helpdesk Staff
© Aad van Moorsel, Newcastle University, 2010
User temporarily without access
22
Conclusions
• CISOs need an awareness of the humanbehavioural implications of their security
management decisions
• Human Factors researchers need a way to
contribute their expertise and align it with
concepts that are familiar to CISOs
– Standards
– IT infrastructure
– Business processes
• We provided an ontology as a solution
– Serves as a formalised base of knowledge
– one piece of the Trust Economics tools
© Aad van Moorsel, Newcastle University, 2010
23
an ontology for structured systems economics
Adam Beaument
UCL, HP Labs
David Pym
HP Labs, University of Bath
ontology to link with the models
thus far, trust economics ontology represent technology
and human behavioural issues
how to glue this to the mathematical models?
© Aad van Moorsel, Newcastle University, 2010
25
ontology
© Aad van Moorsel, Newcastle University, 2010
26
© Aad van Moorsel, Newcastle University, 2010
27
conclusion on trust economics ontology
trust economics ontology is work in progress
- added human behavioural aspects to IT security
concepts
- provided an abstraction that allows IT to be
represented tailored to process algebraic model
to do:
- complete as well as simplify...
- proof is in the pudding: someone needs to use it in a
case study
© Aad van Moorsel, Newcastle University, 2010
28
an ontology editor and a community ontology
John Mace (project student)
Simon Parkin
Aad van Moorsel
Stefan Fenz
SBA, Austria
Stakeholders
• Chief Information Security Officers (CISOs)
• Human Factors Researchers
• Ontology experts
30
Current Ontology Development
•
•
•
•
Requires use of an ontology creation tool
Graphical or text based tools
Both create machine readable ontology file from user input
User must define underlying ontology structure
31
Current Development Issues
• Knowledge required of ontology development and tools
• Development knowledge held by ontology experts and not those
whose knowledge requires capture
• Current tools are complex and largely aimed at ontology experts
• Process is time-consuming and error prone
32
how would you want to write ontology content?
<Vulnerability rdf:about="#SinglePasswordMemorisationDifficult">
<mitigatedBy rdf:resource="#MakePasswordEasierToRemember"/>
<exploitedBy rdf:resource="#SinglePasswordForgotten"/>
</Vulnerability>
33
Proposed Solution
• A simple, intuitive tool to create/modify ontology in graphical
form
• Captures knowledge of domain experts while removing need to
know of ontology construction techniques
• Underlying information security ontology structure is predefined
• Interactive help system and mechanisms to minimise error
34
Implementation Overview
Chief Information Security Officer (CISO) /
Human Factors Researcher (HFR)
enter content
load
existing
diagram
Ontology Diagram Store
ontology
diagram
save
current
diagram
Java Translation Program
Ontology Editor
35
ontology
file
Ontology File Store
Ontology Editor
36
Adding New Concept
37
Ontology Diagram
38
Java Translation Program
Ontology Diagram
diagram
saved to
Temp
folder
Ontology File
diagram
retrieved
from Temp
folder
file saved
file created
user defined
parameters
Java Translation Program
Ontology Editor
Ontology File Store
Java libraries imported
Java 1.5 API
Xerces API
OWL API
39
Ontology File
• Written in machine readable Web Ontology Language OWL
• Created using OWL API
• File structure:
– Header
– Classes
– Data properties
– Object properties
– Individuals
40
Ontology File Example
<Vulnerability rdf:about="#SinglePasswordMemorisationDifficult">
<mitigatedBy rdf:resource="#MakePasswordEasierToRemember"/>
<exploitedBy rdf:resource="#SinglePasswordForgotten"/>
</Vulnerability>
41
Summary
• Need for information security ontology editing tool
• Proposed tool allows domain experts to develop ontology without
knowledge of ontology construction
• Delivers machine readable ontology files
• Simplifies development process
• Allow further development of ‘base’ ontology
42
Future Developments
• Ontology too large for small group to develop effectively
• Vast array of knowledge held globally
• Ontology development needs to be a collaborative process to be
effective
• Web-oriented collaborative editing tool
• Basis for 3rd year dissertation
43
user evaluation for trust economics software
Simon Parkin
Aad van Moorsel
Philip Inglesant
Angela Sasse
UCL
participatory design of a trust economics tool
assume we have all pieces together:
• ontology
• models
• CISO interfaces
what should the tool look like?
we conduct a participatory design study with CISOs from:
• ISS
• UCL
• National Grid
method: get wish list from CISOs, show a mock-up tool and
collect feedback, improve, add model in background, try it
out with CISOs, etc.
© Aad van Moorsel, Newcastle University, 2010
45
Password Policy Composition Tool
File
Help
Breaches / Productivity / Cost
tool to communicate
the result to a CISO
[projected per annum for 100-user sample]
BREACHES
#
Full
#
Composite
#
Partial
#
Productivity
#
Costs
#
BREACHES:
Composite
Policy Properties
ss 3 350
Cla
Cla
ss 1 280
Cla
Password Change Notification:
#upper
i
upper
#upper
#
#min_length
#upper
i
#notif_days
#lower
#lower
Password Login Attempts:
Password Complexity:
i
#upper
#
#
ss 2 175
No.
ss 3 350
Cla
Organisation Properties User Properties
Password Length:
upper
#upper
#
Partial
Cla
ss 2 175
ss 1 280
Cla
Cla
ss 3 350
ss 2 175
Cla
Cla
ss 1 280
No.
No.
Full
i
#upper
char_classes
max_retries
#
lower
#
lower
Password Change Frequency:
#upper
i
#change_frequency
#lower
Generate Output
Export Policy
CISO user interfaces
Policy Properties
Organisation Properties User Properties
Manned Helpdesk - No. of Staff:
Manned Helpdesk - Staff Salary:
Automated Helpdesk Annual Support Cost:
Manned Helpdesk – Reset
Request Completion Time:
Automated Helpdesk – Reset
Request Completion Time:
GBP
USD
Hrs
Mins
Helpdesk Strategy:
Manned
Automated
i
Password Length
RELATED GUIDELINE(S)
Guideline: ISO27002 - 11.3.1(d)
VULNERABILITIES
Vulnerability: Password entry may be observed
Threat: Password may be guessed by someone
Vulnerability: Password entry may become impractical
Threat: Typographical errors result in login failure
Threat: Typographical errors result in account lockout
Threat: Login entry takes too long
OK
© Aad van Moorsel, Newcastle University, 2010
47
Information Security Management
Find out about how users behave, what the business issues
are:
CISO1: Transport is a big deal.
Interviewer1: We’re trying to recognise this in our user classes.
CISO1: We have engineers on the road, have lots of access, and are more gifted in
IT.
Interviewer1: Do you think it would be useful to configure different user
classes?
CISO1: I think it’s covered.
Interviewer1: And different values, different possible consequences if a loss
occurs. I’m assuming you would want to be able to configure.
CISO1: Yes. Eg. customer list might or might not be very valuable.
Interviewer1: And be able to configure links with different user classes and the
assets.
CISO1: Yes, if you could, absolutely.
Interviewer1: We’re going to stick with defaults at first and allow configuration
if needed later. So, the costs of the password policy: running costs, helpdesk
staff, trade-off of helpdesk vs. productivity
CISO1: That’s right.
© Aad van Moorsel, Newcastle University, 2010
48
Information Security Management
Find out about how users behave, what the business issues
are:
Discussion of "Productivity Losses":
CISO2: But it’s proportional to amount they earn. This is productivity. eg. $1m
salary but bring $20m into the company. There are expense people and
productivity people.
Interviewer1: We have execs, “road warrior”, office drone. Drones are just a
cost.
Interviewer2: And the 3 groups have different threat scenarios.
CISO2: Risk of over-complicating it, hard to work out who is income-earner and
what proportion is income earning.
Interviewer2: But this is good point.
CISO2: Make it parameterisable, at choice of CISO.
…
CISO2: So, need to be able to drill down into productivity, cost, - esp in small
company.
© Aad van Moorsel, Newcastle University, 2010
49
example of the trust economics methodology
access management
Maciej Machulak (also funded by JISC SMART)
James Turland (funded by EPSRC AMPS)
Wen Zeng (for DRM)
Aad van Moorsel
Geoff Duggan
Hilary Johnson
University of Bath
Project Description
• The SMART (Student-Managed Access to Online Resources)
project will develop an online data access management
system based on the User-Managed Access (UMA) Web
protocol, deploy it within Newcastle University and
evaluate the system through a user study.
– The project team will also contribute to the
standardisation effort of the UMA protocol by actively
participating in the User-Managed Access Work Group
(UMA WG – charter of the Kantara Initiative)
51
Project Description - UMA
• User-Managed Access protocol – allows an individual control
the authorization of data sharing and service access made
between online services on the individual's behalf.
Source: http://kantarainitiative.org/confluence/display/uma/UMA+Explained
52
Project Description – Objectives
• Objectives:
– Define scenario for UMA use case within Higher
Education (HE) environments
– Develop UMA-based authorisation solution
– Deploy the UMA-based solution within Newcastle
University:
• Integrate the system with institutional Web
applications
• Evaluate the system through a user study
– Contribute with the scenario, software and project
findings to the UMA WG and actively participate in the
standardisation effort of the UMA Web protocol.
– Demonstrate, document and disseminate project
outputs
53
trust economics applied to access management
• we build the application
• we build models to quantify trust or CIA properties
• we investigate user interfaces and user behaviour to
input into the model
related: we also build DRM models, trading off
productivity and confidentiality
54
modelling concepts and model validation
Rob Cain (funded by HP)
Simon Parkin
Aad van Moorsel
Doug Eskin (funded by HP)
Robin Berthier
Bill Sanders
University of Illinois at Urbana-Champaign
project objectives
• performance models traditionally have not included human
behavioural aspects in their models
• we want to have generic modelling constructs to represent
human behaviour, tendencies and choices:
– compliance budget
– risk propensity
– impact of training
– role dependent behaviour
• we want to validate our models with collected data
– offline data, such as from interviews
– online data, measure ‘live’
• we want to optimise the data collection strategy
• in some cases, it makes sense to extend our trust economics
methodology with a strategy for data
collection
56
Presentation of Mobius
57
Sample Results
Without Comp Budget Feedback
380
360
340
320
Utility
300
HB Score
280
260
240
220
0
0.1
0.2
0.3
0.4
0.5
0.6
Prob of Encryption
58
0.7
0.8
0.9
1
Sample Mobius Results (Cont.)
Using Comp Budget Feedback
380
360
340
320
Utility
300
HB Score
280
260
240
220
0
0.1
0.2
0.3
0.4
0.5
0.6
Prob of Encryption
59
0.7
0.8
0.9
1
Criticality of Using Data
• The goal of using data is to provide credibility to the
model:
– By defining and tuning input parameters according to
individual organization
– By assessing the validity of prediction results
• Issues:
– Numerous data sources
– Collection and processing phases are expensive and
time consuming
– No strategy to drive data monitoring
– Mismatch between model and data that can be
collected
60
Data Collection Approach
Stakeholders
1
2
Data
Sources
Cost / Quality
Model
Importance
3
4
1.
2.
3.
4.
•
•
Input parameter definition
Output validation
Design specialized model according to requirements
Classify potential data sources according to their cost and quality
Optimize collection of data according to parameter importance
Run data validation and execute model
61
Data Sources Classification
• Cost:
– Cost to obtain
– Time to obtain
– Transparency
– Legislative process
• Quality:
– Accuracy
– Applicability
• Importance:
– Influence of parameter value on output
62
Organization Budget Parameters
input/o
Category
utput
Parameter
Description
Variables
Influence
Data Sources and Cost
IT security survey
(http://www.gartner.com,
http://www.gocsi.com)
in
Budget
Total security
investment
IT budget. Default
is 100
medium
interview with IT directors
public gov. budget data
in
in
in
Budget
Training
investment
Training budget.
Always, one-off
100
USB stick =
100, software =
0, install and
maintenance =
0
Experimental
value. Proportion
Support proportion
of Active Security
Budget
of budget
Investment used
for support
Budget
Low
Medium
High
Monitoring
proportion of
budget
interview with IT directors
low
public gov. budget data
interview with IT directors
high
public gov. budget data
Experimental
value. 1 – (Support
proportion of
budget)
interview with IT directors
high
public gov. budget data
© Aad van Moorsel, Newcastle University,
63 2010
63
Overall Human Parameters
input/
output
in
in
Category
User
behavior
User
behavior
Parameter
Description
Compliance
budget
Effort willing to
spend
conforming
with security
policy that
doesn't benefit
you.
Perceived
benefit of task
Effort willing to
put in without
using
compliance
budget.
Variables
Influence
Generalised:
understanding,
investment,
incentives
© Aad van Moorsel, Newcastle University,
64 2010
64
Data Sources and Cost
User survey
Password: Probability of Break-in
input/ou
tput
Category
Parameter
in
Culture of
organization
in
User behavior Password strength
in
Attacker
Password strength
determination threshold
in
User behavior
Password update
frequency
in
User behavior
in
Description
Prob, of leaving default
password
Variables
Influence
Organization policy, user training
medium
Organization policy, user training
medium
Password stength, attacker
determination
medium
Organization policy, user training
medium
Prob. of being locked
out
when password is forgotten Organization policy, user training
medium
User interface
Prob. of finding lost
password
efficiency of password
recovery tech.
medium
in
User interface
Prob. of needing
support
(#support queries / #users) prob. of forgetting password
medium
in
User behavior
Management
reprimands
medium
in
User behavior
Negative support
experiences
medium
out
User behavior
Prob. password can be
compromised
out
Security
Availability
#successful data transfer
high
out
Security
Confidentiality
#exposures + #reveals
high
Compromised by brute
force attack
high
65
Data Sources and Cost
data collection research
four sub problems:
• determine which data is needed to validate the model:
– provide input parameter values
– validate output parameters
• technical implementation of the data collection
• optimize data collection such that cost is within a certain
bound: need to find the important parameters and trade
off with cost of collecting it
• add data collection to the trust economics methodology:
– a data collection strategy will be associated with the
use of a model
66
conclusion
trust economics research in Newcastle:
• ontology for human behavioural aspects, incl. editor and
community version
• tool design with CISOs
• modelling: DRM and Access Management
• data collection strategies for validation
work to be done:
• generic ontology for trust economics, underlying the tools
• actual tool building
• evaluation of the methodology
and formulate a publication strategy
© Aad van Moorsel, Newcastle University, 2010
67
trust economics info
http://www.trust-economics.org/
Publications:
• An Information Security Ontology Incorporating Human-Behavioural Implications. Simon Parkin, Aad van Moorsel,
Robert Coles. International Conference on Security of Information and Networks, 2009
• Risk Modelling of Access Control Policies with Human-Behavioural Factors. Simon Parkin and Aad van Moorsel.
International Workshop on Performability Modeling of Computer and Communication Systems, 2009.
• A Knowledge Base for Justified Information Security Decision-Making. Daria Stepanova, Simon Parkin, Aad van Moorsel.
International Conference on Software and Data Technologies, 2009.
• Architecting Dependable Access Control Systems for Multi-Domain Computing Environments. Maciej Machulak, Simon
Parkin, Aad van Moorsel. Architecting Dependable Systems VI, R. De Lemos, J. Fabre C. Gacek, F. Gadducci and M. ter
Beek (Eds.), Springer, LNCS 5835, pp. 49—75, 2009.
• Trust Economics Feasibility Study. Robert Coles, Jonathan Griffin, Hilary Johnson, Brian Monahan, Simon Parkin, David
Pym, Angela Sasse and Aad van Moorsel. Workshop on Resilience Assessment and Dependability Benchmarking, 2008.
• The Impact of Unavailability on the Effectiveness of Enterprise Information Security Technologies. Simon Parkin,
Rouaa Yassin-Kassab and Aad van Moorsel. International Service Availability Symposium, 2008.
Technical reports:
• Architecture and Protocol for User-Controlled Access Management in Web 2.0 Applications. Maciej Machulak, Aad van
Moorsel. CS-TR 1191, 2010
• Ontology Editing Tool for Information Security and Human Factors Experts. John Mace, Simon Parkin, Aad van Moorsel.
CS-TR 1172, 2009
• Use Cases for User-Centric Access Control for the Web, Maciej Machulak, Aad van Moorsel. CS-TR 1165, 2009
• A Novel Approach to Access Control for the Web. Maciej Machulak, Aad van Moorsel. CS-TR 1157, 2009
• Proceedings of the First Trust Economics Workshop. Philip Inglesant, Maciej Machulak, Simon Parkin, Aad van Moorsel,
Julian Williams (Eds.). CS-TR 1153, 2009.
• A Trust-economic Perspective on Information Security Technologies. Simon Parkin, Aad van Moorsel. CS-TR 1056, 2007
© Aad van Moorsel, Newcastle University, 2010
68
Download