What is it about?

Security concepts are typically black-or-white: either a system is deemed fully secure, or fully insecure. We propose that, for some security properties, a graded view can be offered by "measuring" how difficult it is to break them. We also demonstrate how the idea works in a case study based on an electronic voting scenario.

Featured Image

Why is it important?

In many contexts, there are no "fully secure" solutions in practice. Then, it is crucial to compare them and determine which ones are more secure than others. We propose a first step towards capturing this kind of difference.

Perspectives

In this paper, we take a theoretical idea from one field (logical foundations of multi-agent systems), and apply it to a concept in another field (cybersecurity) to make the concept more practical. This is what makes the paper especially interesting to me.

Wojciech Jamroga

Read the Original

This page is a summary of: How to measure usable security: Natural strategies in voting protocols, Journal of Computer Security, July 2022, IOS Press,
DOI: 10.3233/jcs-210049.
You can read the full text:

Read

Contributors

The following have contributed to this page