The Role of Trust in Computer Security

Christian D. Jensen

    Research output: Chapter in Book/Report/Conference proceedingConference abstract in proceedingsResearchpeer-review

    Abstract

    Summary form only given. Traditional security technologies are based on numerous assumptions about the environment in which systems are used. This includes assumptions about the enforcement of legislative and contractual frameworks, limitations of particular technologies and the constraints on human behaviour imposed by social and religious norms. Most of these assumptions, however, are implicit and they will fail when the environment of the systems change, e.g., when systems are used on a global scale on the Internet. This talk identifies such implicit assumptions in current security technologies and show how many of them concern the placement of trust on human or system agents. We argue that making such assumptions about trust explicit is an essential requirement for the future of system security and argue why the formalisation of computational trust is necessary when we wish to reason about system security.
    Original languageEnglish
    Title of host publication2012 Tenth Annual International Conference on Privacy, Security and Trust (PST)
    PublisherIEEE
    Publication date2012
    Pages236
    ISBN (Print)978-1-4673-2323-9
    ISBN (Electronic)978-1-4673-2325-3
    DOIs
    Publication statusPublished - 2012
    Event10th Annual International Conference on Privacy, Security and Trust (PST 2012) - Institut MINES-TELECOM, Paris, France
    Duration: 16 Jul 201218 Jul 2012
    http://www.unb.ca/pstnet/pst2012/cfp.htm

    Conference

    Conference10th Annual International Conference on Privacy, Security and Trust (PST 2012)
    LocationInstitut MINES-TELECOM
    Country/TerritoryFrance
    CityParis
    Period16/07/201218/07/2012
    Internet address

    Bibliographical note

    Keynote talk at the 3rd Workshop on Trustworthy Self-Organizing Systems (TSOS 2012).

    Fingerprint

    Dive into the research topics of 'The Role of Trust in Computer Security'. Together they form a unique fingerprint.

    Cite this