Mixed-initiative security agents

Rachel Greenstadt, Sadia Afroz, Michael Brennan

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Security decision-making is hard for both humans and machines. This is because security decisions are context-dependent, require highly dynamic, specialized knowledge,and require complex risk analysis. Multiple user studies show that humans have difficulty making these decisions, due to insufficient information and bounded rationality. However, current automated solutions are often too rigid to adequately address the problem and leave their users more confused and inept when they fail. A mixed-initiative approach, in which users and machines collaborate to make security decisions and make use of complementary strengths rather than weaknesses, is needed.

    Original languageEnglish (US)
    Title of host publicationProceedings of 2nd ACM Workshop on Security and Artificial Intelligence, AISec '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09
    Pages35-38
    Number of pages4
    DOIs
    StatePublished - 2009
    Event2nd ACM Workshop on Security and Artificial Intelligence, AISec '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09 - Chicago, IL, United States
    Duration: Nov 9 2009Nov 13 2009

    Publication series

    NameProceedings of the ACM Conference on Computer and Communications Security
    ISSN (Print)1543-7221

    Conference

    Conference2nd ACM Workshop on Security and Artificial Intelligence, AISec '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09
    Country/TerritoryUnited States
    CityChicago, IL
    Period11/9/0911/13/09

    Keywords

    • Artificial Intelligence
    • Mixed initiative
    • Security

    ASJC Scopus subject areas

    • Software
    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'Mixed-initiative security agents'. Together they form a unique fingerprint.

    Cite this