Conference paper
The Role of Trust in Computer Security
Department of Informatics and Mathematical Modeling, Technical University of Denmark1
Computer Science and Engineering, Department of Informatics and Mathematical Modeling, Technical University of Denmark2
Embedded Systems Engineering, Department of Informatics and Mathematical Modeling, Technical University of Denmark3
Summary form only given. Traditional security technologies are based on numerous assumptions about the environment in which systems are used. This includes assumptions about the enforcement of legislative and contractual frameworks, limitations of particular technologies and the constraints on human behaviour imposed by social and religious norms.
Most of these assumptions, however, are implicit and they will fail when the environment of the systems change, e.g., when systems are used on a global scale on the Internet. This talk identifies such implicit assumptions in current security technologies and show how many of them concern the placement of trust on human or system agents.
We argue that making such assumptions about trust explicit is an essential requirement for the future of system security and argue why the formalisation of computational trust is necessary when we wish to reason about system security.
Language: | English |
---|---|
Publisher: | IEEE |
Year: | 2012 |
Pages: | 236-236 |
Proceedings: | 10th Annual International Conference on Privacy, Security and Trust (PST 2012)International Conference on Privacy, Security and Trust |
ISBN: | 1467323233 , 146732325X , 1467323268 , 9781467323239 , 9781467323253 and 9781467323260 |
Types: | Conference paper |
DOI: | 10.1109/PST.2012.6297950 |
ORCIDs: | Jensen, Christian D. |