DocumentCode :
3508404
Title :
(How) Can We Manage the Trustworthiness of Security Infrastructures and Services?
Author :
Xu, Shouhuai
Author_Institution :
Dept. of Comput. Sci., Univ. of Texas, San Antonio, TX
fYear :
2008
fDate :
14-17 Oct. 2008
Firstpage :
6
Lastpage :
6
Abstract :
The Internet has become a vital communication infrastructure. However, the same Internet has also become the vehicle for many powerful malicious attacks (e.g., botnets) that could turn it into doing more harm than good. This has led to the development, and sometimes deployment, of various security infrastructures and services (e.g., PKI, DNSSEC and TPM). Unfortunately, it seems inevitable, at least for the many years to come, that malicious attacks would remain successfully. Therefore, it has become increasingly more important to be able to understand, model, and ultimately manage the trustworthiness of security infrastructures and services. In this talk the speaker will expose his view towards solving this challenging and important problem. Some initial results and open problems will be discussed as well.
Keywords :
Internet; security of data; Internet; certificate revocation list; intrusion detection systems; malicious attacks; security infrastructures; security services; trustworthiness; Computer science; Concrete; Conference management; Cryptographic protocols; Internet; Public key; Public key cryptography; Security; Technology management; Vehicles;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trusted Infrastructure Technologies Conference, 2008. APTC '08. Third Asia-Pacific
Conference_Location :
Hubei
Print_ISBN :
978-0-7695-3363-6
Type :
conf
DOI :
10.1109/APTC.2008.11
Filename :
4683077
Link To Document :
بازگشت