14.07.2013 Views

Understanding Security APIs - CrySyS Lab

Understanding Security APIs - CrySyS Lab

Understanding Security APIs - CrySyS Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

8.4 Personnel and Social Engineering Issues . . . . . . . . . . . . . . . . . 150<br />

8.4.1 Dual <strong>Security</strong> Officer Attack . . . . . . . . . . . . . . . . . . . 151<br />

8.4.2 M-of-N <strong>Security</strong> Officer Attack . . . . . . . . . . . . . . . . . 152<br />

8.4.3 How Many <strong>Security</strong> Officers are Best? . . . . . . . . . . . . . 154<br />

8.4.4 Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . 154<br />

9 The Future of <strong>Security</strong> <strong>APIs</strong> 156<br />

9.1 Designing <strong>APIs</strong> Right . . . . . . . . . . . . . . . . . . . . . . . . . . . 156<br />

9.2 Future API Architectures . . . . . . . . . . . . . . . . . . . . . . . . 157<br />

9.3 Trusted Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159<br />

9.4 The Bottom Line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160<br />

10 Conclusions 161<br />

10.1 Roles and Responsibilities . . . . . . . . . . . . . . . . . . . . . . . . 162<br />

10.2 The <strong>Security</strong> API Designer . . . . . . . . . . . . . . . . . . . . . . . . 163<br />

10.3 Closing Remark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163<br />

11 Glossary 164<br />

11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!