Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Security, privacy and user interaction
Jakobsson M., Springer International Publishing, New York, NY, 2020. 153 pp. Type: Book (978-3-030437-53-4)
Date Reviewed: Aug 11 2021

This book reviews pivotal application problems related to security and privacy by considering end user interactions. The editor uses his own experiences to explain how he converts “pure” cryptography to user awareness solutions. Following this principle, the book is divided into three parts, which are based on typical, malicious, and hybrid users, respectively.

The first part of this book consists of three chapters. Chapter 1 describes second-factor authentication (though the term “two-factor authentication” is widely accepted) and how its problem is mitigated by considering the typical user. Chapter 2 reviews the requested permissions problem via a more accessible and comprehensible model for typical users. Chapter 3 considers how tracking is performed and how associated information is provided.

In the second part, two chapters address security design under malicious users. In particular, an environmentally and politically conscious scheme for blockchain is illustrated. It well describes how a widely used security system such as proof of work (PoW) can be transferred in light of abusive activities.

Part 3 tries to combine malicious and typical users into security mechanisms. However, it is confusing since it can hardly find a security protocol that is only designed for malicious users. As far as I am concerned, Parts 2 and 3 can be combined. For example, chapter 5’s blockchain scheme not only considers abusive user but also typical user performance. Moreover, chapter 7 should come before chapter 6, so that readers first gain an understanding of launchpad attacks.

Overall, this book provides fruitful content for engineers and researchers to consider when designing (or adopting) a security protocol. The editor uses many paradigms and charts to lively depict what he wants readers to comprehend. I recommend this book to readers who have a background in information security, especially cryptographic engineers and researchers.

Reviewer:  Zheng Gong Review #: CR147330
Bookmark and Share
  Reviewer Selected
 
 
Security and Protection (D.4.6 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy