Author_Institution :
Dept. of Comput. Sci., Univ. of Texas, San Antonio, TX
Abstract :
The Internet has become a vital communication infrastructure. However, the same Internet has also become the vehicle for many powerful malicious attacks (e.g., botnets) that could turn it into doing more harm than good. This has led to the development, and sometimes deployment, of various security infrastructures and services (e.g., PKI, DNSSEC and TPM). Unfortunately, it seems inevitable, at least for the many years to come, that malicious attacks would remain successfully. Therefore, it has become increasingly more important to be able to understand, model, and ultimately manage the trustworthiness of security infrastructures and services. In this talk the speaker will expose his view towards solving this challenging and important problem. Some initial results and open problems will be discussed as well.
Keywords :
Internet; security of data; Internet; certificate revocation list; intrusion detection systems; malicious attacks; security infrastructures; security services; trustworthiness; Computer science; Concrete; Conference management; Cryptographic protocols; Internet; Public key; Public key cryptography; Security; Technology management; Vehicles;