HotSoS '14: Proceedings of the 2014 Symposium and Bootcamp on the Science of Security
Title | HotSoS '14: Proceedings of the 2014 Symposium and Bootcamp on the Science of Security |
Publication Type | Conference Proceedings |
Year of Publication | 2014 |
Authors | Williams, Laurie A., Nicol, David M., Singh, Munindar P. |
Conference Name | Symposium and Bootcamp on the Science of Security |
Publisher | ACM |
Conference Location | Raleigh, NC |
ISBN Number | 978-1-4503-2907-1 |
Keywords | Access Control, Architectures, Control, Distributed Systems Security, Foundations, Human and Societal Aspects of Security and Privacy, Modeling, Moving-Target Defense, Network security, phishing, science of security, Social Engineering Attacks |
Abstract | The Symposium and Bootcamp on the Science of Security (HotSoS), is a research event centered on the Science of Security (SoS). Following a successful invitational SoS Community Meeting in December 2012, HotSoS 2014 was the first open research event in what we expect will be a continuing series of such events. The key motivation behind developing a Science of Security is to address the fundamental problems of cybersecurity in a principled manner. Security has been intensively studied, but a lot of previous research emphasizes the engineering of specific solutions without first developing the scientific understanding of the problem domain. All too often, security research conveys the flavor of identifying specific threats and removing them in an apparently ad hoc manner. The motivation behind the nascent Science of Security is to understand how computing systems are architected, built, used, and maintained with a view to understanding and addressing security challenges systematically across their life cycle. In particular, two features distinguish the Science of Security from previous research programs on cybersecurity. Scope. The Science of Security considers not just computational artifacts but also incorporates the human, social, and organizational aspects of computing within its purview. Approach. The Science of Security takes a decidedly scientific approach, based on the understanding of empirical evaluation and theoretical foundations as developed in the natural and social sciences, but adapted as appropriate for the "artificial science" (paraphrasing Herb Simon's term) that is computing. |
URL | http://dl.acm.org/citation.cfm?id=2600176&picked=prox&cfid=561740640&cftoken=72764684 |
DOI | 10.1145/2600176.2600177 |
Citation Key | Williams:2014:2600176 |
- Architectures
- Architectures
- Control
- Modeling
- Science of Security
- Foundations
- Access Control
- Architectures
- control
- distributed systems security
- foundations
- Human and Societal Aspects of Security and Privacy
- modeling
- moving-target defense
- network security
- Phishing
- Science of Security
- Social Engineering Attacks
- Phishing
- Access Control
- Social Engineering Attacks
- Human and Societal Aspects of Security and Privacy
- Distributed Systems Security
- Network Security
- Moving-Target Defense