Invisible Security

  • Giampaolo BellaEmail author
  • Bruce Christianson
  • Luca Viganò
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10368)


In the last decades, digital security has gone through many theoretical breakthroughs, practical developments, worldwide deployments and subtle flaws in a continuous loop. It is mainly understood as a property of a technical system, which is eventually built as a tangible piece of technology for common people to use. It has therefore been assessed in terms of its correctness because it may easily go wrong, of its usability because it may be difficult to interact with, and of its economics because it may be inconvenient to deploy, maintain or re-deploy.

In line with the theme “Evolving Security” of this year’s Security Protocols Workshop, our view is that the shape of security as outlined above is in fact getting more and more multifaceted as we write. It was at the same event last year when we depicted an additional facet of security that is its being beautiful [1], namely inherently desirable for its users. Here, we further observe that security should be invisible in the sense that the user’s perceived burden of complying with it be negligible. Through a few past, present and (advocated) future examples, this position paper supports invisibility as yet another desirable facet of security.


  1. 1.
    Bella, G., Viganò, L.: Security is beautiful. In: Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F., Anderson, J. (eds.) Security Protocols 2015. LNCS, vol. 9379, pp. 247–250. Springer, Cham (2015). doi: 10.1007/978-3-319-26096-9_25 CrossRefGoogle Scholar
  2. 2.
    Minority Report: A movie directed by Steven Spielberg and starring Tom Cruise. The screenplay was written by Scott Frank and Jon Cohen, quite loosely based on a short story by Philip K. Dick (2002)Google Scholar
  3. 3.
    Bettinelli, S.: Tomo secondo che contiene l’Entusiasmo. Dalle Stampe Zatta (1780)Google Scholar
  4. 4.
    Bella, G., Coles-Kemp, L.: Layered analysis of security ceremonies. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IAICT, vol. 376, pp. 273–286. Springer, Heidelberg (2012). doi: 10.1007/978-3-642-30436-1_23 CrossRefGoogle Scholar
  5. 5.
    Bella, G., Curzon, P., Lenzini, G.: Service security and privacy as a socio-technical problem. J. Comput. Secur. 23, 563–585 (2015)CrossRefGoogle Scholar
  6. 6.
    Ellison, C.M.: Ceremony design and analysis. IACR Cryptology ePrint Archive 2007: 399 (2007)Google Scholar
  7. 7.
    Martina, J.E., dos Santos, E., Carlos, M.C., Price, G., Custódio, R.F.: An adaptive threat model for security ceremonies. Int. J. Inf. Sec. 14, 103–121 (2015)CrossRefGoogle Scholar
  8. 8.
    Radke, K., Boyd, C., Gonzalez Nieto, J., Brereton, M.: Ceremony analysis: strengths and weaknesses. In: Camenisch, J., Fischer-Hübner, S., Murayama, Y., Portmann, A., Rieder, C. (eds.) SEC 2011. IAICT, vol. 354, pp. 104–115. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-21424-0_9 CrossRefGoogle Scholar
  9. 9.
    Smith, R.: Ryanair passenger gets on wrong plane and flies to Sweden instead of France (2012).

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Giampaolo Bella
    • 1
    Email author
  • Bruce Christianson
    • 2
  • Luca Viganò
    • 3
  1. 1.Dipartimento di Matematica e InformaticaUniversità di CataniaCataniaItaly
  2. 2.School of Computer ScienceUniversity of HertfordshireHatfieldUK
  3. 3.Department of InformaticsKing’s College LondonLondonUK

Personalised recommendations