Difference between revisions of "Ceremony"
From MgmtWiki
(→Full Title) |
(→Context) |
||
(One intermediate revision by the same user not shown) | |||
Line 4: | Line 4: | ||
==Context== | ==Context== | ||
− | A ceremony goes beyond cyber protocols to ensure the integrity of communication with the user. <ref>Carl Ellison, ''Ceremony Design and Analysis | + | A ceremony goes beyond cyber protocols to ensure the integrity of communication with the user. <ref>Carl Ellison, ''Ceremony Design and Analysis'' The International Association for Cryptologic Research (IACR) (2007) https://eprint.iacr.org/2007/399</ref> |
This concept calls for profoundly changing the user’s experience so it becomes predictable and unambiguous enough to allow for informed decisions. | This concept calls for profoundly changing the user’s experience so it becomes predictable and unambiguous enough to allow for informed decisions. | ||
Line 11: | Line 11: | ||
==References== | ==References== | ||
− | + | Some information came from a Kim Cameron article dated 2010. |
Latest revision as of 18:05, 18 January 2023
Contents
Full Title
Carl Ellison and his colleagues have coined the term ‘ceremony’ to describe interactions that span a mixed network of human and cybernetic system components – the full channel from web server to human brain.
Context
A ceremony goes beyond cyber protocols to ensure the integrity of communication with the user. [1] This concept calls for profoundly changing the user’s experience so it becomes predictable and unambiguous enough to allow for informed decisions.
Solution
- Web Authentication defines Ceremony as an extension of the concept of a network protocol, with human nodes alongside computer nodes and with communication links that include user interface(s), human-to-human communication, and transfers of physical objects that carry data. What is out-of-band to a protocol is in-band to a ceremony. In Web Authentication, Registration and Authentication are ceremonies, and an authorization gesture is often a component of those ceremonies.
References
Some information came from a Kim Cameron article dated 2010.- ↑ Carl Ellison, Ceremony Design and Analysis The International Association for Cryptologic Research (IACR) (2007) https://eprint.iacr.org/2007/399