Skip to main content

Security is Beautiful

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9379))

Abstract

In the movie “Life is Beautiful”, Guido Orefice, the character interpreted by Roberto Benigni, convinces his son Giosuè that they have been interned in a nazi concentration camp not because they are Jews but because they are actually taking part in a long and complex game in which they, and in particular Giosuè, must perform the tasks that the guards give them. A ghastly experience is turned into a livable, at times even almost enjoyable, one.

In this position paper, we advocate that, in the same spirit as Guido’s ingenious trick of turning a nazi camp into a sort of playground for his child, security should be beautiful; and if it isn’t so yet, it should then be made beautiful, so that the users experience it in that way. This is, of course, an extremely challenging objective, and we will discuss through further scenarios a few ways in which it could be made possible in the future. It turns out that the Peppa Pig cartoon may also be inspiring.

L. Viganò— Supported by the EU FP7 Project no. 257876, “SPaCIoS: Secure Provision and Consumption in the Internet of Services” (www.spacios.eu) and the PRIN 2010-11 project “Security Horizons”. This work began while Luca Viganò was at the Dipartimento di Informatica, Università di Verona, Italy.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Life is Beautiful (La vita è bella), Italy 1997, directed by Roberto Benigni, written by Roberto Benigni and Vincenzo Cerami.

References

  1. Acquisti, A.: The Economics of Privacy. http://www.heinz.cmu.edu/~acquisti/economics-privacy.htm

  2. Anderson, R.: Economics and Security Resource Page. http://www.cl.cam.ac.uk/~rja14/econsec.html

  3. August, T., August, R., Shin, H.: Designing user incentives for cybersecurity. Commun. ACM 57(11), 43–46 (2014)

    Article  Google Scholar 

  4. Blythe, J., Koppel, R., Smith, S.W.: Circumvention of security: good users do bad things. IEEE Secur. Priv. 11(5), 80–83 (2013)

    Article  Google Scholar 

  5. Böhme, R. (ed.): The Economics of Information Security and Privacy. Springer, Heidelberg (2013)

    Google Scholar 

  6. Karlof, C., Tygar, J.D., Wagner, D.: Conditioned-safe ceremonies and a user study of an application to web authentication. In: SOUPS 2009: Proceedings of the 5th Symposium on Usable Privacy and Security. ACM Press (2009)

    Google Scholar 

  7. Lampson, B.: Usable security: how to get it. Commun. ACM 52(11), 25–27 (2009)

    Article  Google Scholar 

  8. Payne, B.D., Edwards, W.K.: A brief introduction to usable security. IEEE Internet Comput. 12(3), 13–21 (2008)

    Article  Google Scholar 

  9. Peppa Pig, Series 3, Episode 38, “The Secret Club” (2010)

    Google Scholar 

  10. Radke, K., Boyd, C., Gonzalez Nieto, J., Brereton, M.: Ceremony analysis: strengths and weaknesses. In: Camenisch, J., Fischer-Hübner, S., Murayama, Y., Portmann, A., Rieder, C. (eds.) SEC 2011. IFIP AICT, vol. 354, pp. 104–115. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  11. Visualisation and Other Methods of Expression (2012). http://vome.org.uk/

  12. Wash, R., Mackie-Mason, J.K.: Incentive-centered design for information security. In: HOTSEC 2006: Proceedings of the 1st Conference on USENIX Workshop on Hot Topics in Security. USENIX Association (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Luca Viganò .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Bella, G., Viganò, L. (2015). Security is Beautiful. In: Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F., Anderson, J. (eds) Security Protocols XXIII. Security Protocols 2015. Lecture Notes in Computer Science(), vol 9379. Springer, Cham. https://doi.org/10.1007/978-3-319-26096-9_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26096-9_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26095-2

  • Online ISBN: 978-3-319-26096-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics