Skip to main content

Collaborating as Normal: Detecting Systemic Anomalies in Your Partner (Transcript of Discussion)

  • Conference paper
  • First Online:
Security Protocols XXII (Security Protocols 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8809))

Included in the following conference series:

  • 711 Accesses

Abstract

I’d like start with an analogy of the problem that we’ve been thinking about recently. Consider a bank ATM. The provider is the bank who provides this service. Within the bank they use various security controls; the simplest control is your ATM card and your PIN, and maybe there’s a chip there as well. The bank also has terms and conditions about how you’re allowed to use the ATM to withdraw cash.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Points to a picture of an orderly queue of people at an ATM.

  2. 2.

    A disorderly ATM queue http://commons.wikimedia.org/wiki/File:ATM_Masalli.jpg.

  3. 3.

    Points to the log in Fig. 1 of the paper.

  4. 4.

    In Fig. 3 of the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Simon N. Foley .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Foley, S.N. (2014). Collaborating as Normal: Detecting Systemic Anomalies in Your Partner (Transcript of Discussion). In: Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F., Anderson, J. (eds) Security Protocols XXII. Security Protocols 2014. Lecture Notes in Computer Science(), vol 8809. Springer, Cham. https://doi.org/10.1007/978-3-319-12400-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12400-1_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12399-8

  • Online ISBN: 978-3-319-12400-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics