Skip to main content

Trust Areas: A Security Paradigm for the Future Internet

  • Conference paper
Security and Trust Management (STM 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7170))

Included in the following conference series:

Abstract

Security in information and communication technology currently relies on a collection of mostly un-related and un-coordinated security mechanisms. All in all, the end-user has no chance to get a good perception of the security properties satisfied for actions she is executing in the Internet. Classical approaches (e.g. perimeter security) do not work in open and heterogeneous communication environments. Federation of single security mechanisms only works for particular applications and for a small subset of security properties. Thus, new views on trust and security are required for the Future Internet. This vision paper proposes the concept of Trust Areas as one candidate for a security paradigm for the Future Internet and identifies some open research challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley Publishing (2008)

    Google Scholar 

  2. Focardi, R., Gorrieri, R.: Classification of Security Properties (Part I: Information Flow). LNCS, vol. 2171. Springer, Heidelberg (2001)

    Google Scholar 

  3. Focardi, R., Gorrieri, R., Martinelli, F.: Classification of Security Properties (Part II: Network Security). LNCS, vol. 2946. Springer, Heidelberg (2004)

    Google Scholar 

  4. Fuchs, A., Gürgens, S., Rudolph, C.: A Formal Notion of Trust – Enabling Reasoning about Security Properties. In: Nishigaki, M., Jøsang, A., Murayama, Y., Marsh, S. (eds.) IFIPTM 2010. IFIP AICT, vol. 321, pp. 200–215. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  5. Gürgens, S., Ochsenschläger, P., Rudolph, C.: On a formal framework for security properties. International Computer Standards & Interface Journal (CSI), Special issue on formal methods, techniques and tools for secure and reliable applications 27(5), 457–466 (2005)

    Google Scholar 

  6. Mantel, H.: Possibilistic definitions of security – an assembly kit. In: Proceedings of the IEEE Computer Security Foundations Workshop, pp. 185–199 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rudolph, C. (2012). Trust Areas: A Security Paradigm for the Future Internet. In: Meadows, C., Fernandez-Gago, C. (eds) Security and Trust Management. STM 2011. Lecture Notes in Computer Science, vol 7170. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29963-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29963-6_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29962-9

  • Online ISBN: 978-3-642-29963-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics