The Role of Trust in Computer Security

Publication: Research - peer-reviewConference abstract in proceedings – Annual report year: 2012

View graph of relations

Summary form only given. Traditional security technologies are based on numerous assumptions about the environment in which systems are used. This includes assumptions about the enforcement of legislative and contractual frameworks, limitations of particular technologies and the constraints on human behaviour imposed by social and religious norms. Most of these assumptions, however, are implicit and they will fail when the environment of the systems change, e.g., when systems are used on a global scale on the Internet. This talk identifies such implicit assumptions in current security technologies and show how many of them concern the placement of trust on human or system agents. We argue that making such assumptions about trust explicit is an essential requirement for the future of system security and argue why the formalisation of computational trust is necessary when we wish to reason about system security.
Original languageEnglish
Title2012 Tenth Annual International Conference on Privacy, Security and Trust (PST)
PublisherIEEE
Publication date2012
Pages236
ISBN (print)978-1-4673-2323-9
ISBN (electronic)978-1-4673-2325-3
DOIs
StatePublished

Conference

Conference10th Annual International Conference on Privacy, Security and Trust (PST 2012)
CountryFrance
CityParis
Period16/07/1218/07/12
Internet addresshttp://www.unb.ca/pstnet/pst2012/cfp.htm

Bibliographical note

Keynote talk at the 3rd Workshop on Trustworthy Self-Organizing Systems (TSOS 2012).

CitationsWeb of Science® Times Cited: No match on DOI
Download as:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word

ID: 12515910