DocumentCode
569011
Title
The role of trust in computer security
Author
Jensen, Christian Damsgaard
Author_Institution
DTU Inf., Tech. Univ. of Denmark, Lyngby, Denmark
fYear
2012
fDate
16-18 July 2012
Firstpage
236
Lastpage
236
Abstract
Summary form only given. Traditional security technologies are based on numerous assumptions about the environment in which systems are used. This includes assumptions about the enforcement of legislative and contractual frameworks, limitations of particular technologies and the constraints on human behaviour imposed by social and religious norms. Most of these assumptions, however, are implicit and they will fail when the environment of the systems change, e.g., when systems are used on a global scale on the Internet. This talk identifies such implicit assumptions in current security technologies and show how many of them concern the placement of trust on human or system agents. We argue that making such assumptions about trust explicit is an essential requirement for the future of system security and argue why the formalisation of computational trust is necessary when we wish to reason about system security.
Keywords
Internet; security of data; trusted computing; Internet; computational trust; computer security; human behaviour; religious norms; security technologies; social norms; system security; Computer science; Computer security; Educational institutions; Humans; Informatics; Privacy;
fLanguage
English
Publisher
ieee
Conference_Titel
Privacy, Security and Trust (PST), 2012 Tenth Annual International Conference on
Conference_Location
Paris
Print_ISBN
978-1-4673-2323-9
Electronic_ISBN
978-1-4673-2325-3
Type
conf
DOI
10.1109/PST.2012.6297950
Filename
6297950
Link To Document