DocumentCode :
2360966
Title :
Trust Engineering via Security Protocols
Author :
Guttman, Joshua D.
fYear :
2012
fDate :
25-25 June 2012
Firstpage :
1
Lastpage :
2
Abstract :
Security protocols form a central part of the trust infrastructure of the online world. They allow principals to make decisions that authorize or prohibit actions of other principals, and to make those decisions based on information gathered from other principals. In this invited talk at Socio-Technical Aspects in Security and Trust 2012 (STAST), a view of protocol design that can serve as a trust infrastructure is described. “Trust engineering” is a process leading to protocols that reflect participants´ concerns for authentication, confidentiality, controlling commitments, and repudiability or its opposite.
Keywords :
cryptographic protocols; trusted computing; STAST; decision making; online world; protocol design; security protocols; sociotechnical aspects in security and trust; trust engineering; trust infrastructure; Authentication; Business; Marine vehicles; Merchandise; Niobium; Protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Socio-Technical Aspects in Security and Trust (STAST), 2012 Workshop on
Conference_Location :
Cambridge, MA
Print_ISBN :
978-1-4673-2748-0
Type :
conf
DOI :
10.1109/STAST.2012.15
Filename :
6363422
Link To Document :
بازگشت