Skip to main content
USENIX
  • Conferences
  • Students
Sign in

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by @usenix

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Incentive-Centered Design for Information Security
Tweet

connect with us

Incentive-Centered Design for Information Security

Abstract: 

Humans are “smart components” in a system, but cannot be directly programmed to perform; rather, their autonomy must be respected as a design constraint and incentives provided to induce desired behavior. Sometimes these incentives are properly aligned, and the humans don’t represent a vulnerability. But often, a misalignment of incentives causes a weakness in the system that can be exploited by clever attackers. Incentive-centered design tools help us understand these problems, and provide design principles to alleviate them. We describe incentivecentered design and some tools it provides. We provide a number of examples of security problems for which Incentive Centered Design might be helpful. We elaborate with a general screening model that offers strong design principles for a class of security problems.

Rick Wash, University of Michigan

Jeffrey K. MacKie-Mason, University of Michigan

BibTeX
@inproceedings {268932,
author = {Rick Wash and Jeffrey K. MacKie-Mason},
title = {{Incentive-Centered} Design for Information Security },
booktitle = {First USENIX Workshop on Hot Topics in Security (HotSec 06)},
year = {2006},
address = {Vancouver, B.C. Canada},
url = {https://www.usenix.org/conference/hotsec-06/incentive-centered-design-information-security},
publisher = {USENIX Association},
month = jul,
}
Download

Links

Paper: 
http://usenix.org/events/hotsec06/tech/full_papers/wash/wash.pdf
  • Log in or    Register to post comments

© USENIX

  • Privacy Policy
  • Contact Us