References of "Foley, Simon N"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailSePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision
Symeonidis, Iraklis UL; Aly, Abdelrahaman; Mustafa, Mustafa Asan et al

in Symeonidis, Iraklis (Ed.) Computer Security -- ESORICS 2017 (2017)

We present an efficient secure and privacy-enhancing protocol for car access provision, named SePCAR. The protocol is fully decentralised and allows users to share their cars conveniently without ... [more ▼]

We present an efficient secure and privacy-enhancing protocol for car access provision, named SePCAR. The protocol is fully decentralised and allows users to share their cars conveniently without sacrifising their security and privacy. It provides generation, update, revocation, and distribution mechanisms for access tokens to shared cars, as well as procedures to solve disputes and to deal with law enforcement requests, for instance in the case of car incidents. We prove that SePCAR meets its appropriate security and privacy requirements and that it is efficient: our practical efficiency analysis through a proof-of-concept implementation shows that SePCAR takes only 1.55 s for a car access provision. [less ▲]

Detailed reference viewed: 98 (9 UL)
Full Text
Peer Reviewed
See detail4.2 Social Dynamics Metrics-Working Group Report
Benenson, Zinaida; Bleikertz, Sören; Foley, Simon N. et al

in Socio-Technical Security Metrics (2015)

Individuals continually interact with security mechanisms when performing tasks in everyday life. These tasks may serve personal goals or work goals, be individual or shared. These interactions can be ... [more ▼]

Individuals continually interact with security mechanisms when performing tasks in everyday life. These tasks may serve personal goals or work goals, be individual or shared. These interactions can be influenced by peers and superiors in the respective environments (workplace, home, public spaces), by personality traits of the users, as well as by contextual constraints such as available time, cognitive resources, and perceived available effort. All these influencing factors, we believe, should be considered in the design, implementation and maintenance of good socio-technical security mechanisms. Therefore, we need to observe reliable socio-technical data, and then transform them into meaningful and helpful metrics for user interactions and influencing factors. More precisely, there are three main questions that the group discussed: 1. What data do we need to observe and what of this data we actually can observe and measure? 2. How can we observe and measure? 3. What can we do with the results of the observations? [less ▲]

Detailed reference viewed: 73 (3 UL)