Where Security Research Should Go in the Next Decade
In 2004 the series of annual Secure Data Management workshops as part of VLDB began, so SDM can now celebrate its 10th edition. It is less clear, when research in the area of security began; even for ICT security this is unclear. One could claim, that security research started thousands of years ago, when the original Trojan Horse was designed. While one can probably find even earlier references to research on security issues, referring to the Trojan Horse can also take its justification from the fact, that the original Trojan Horse lead to a decisive end of a security issue after about 10 years. In any case it illustrates, that already several millennia of thinking (or not-thinking) were spent on the issue. Therefore this text starts with a description of relevant goals (1) as well as technical and other trends (2). Then (3) relevant instruments for ICT security are derived from the goals and trends. These instruments are not necessarily new but important for research due to their relevance in general or due to their high number of relevant open questions.
KeywordsCloud Computing Smart Card Security Goal Cloud Computing Service Security Research
André Deuker, Markus Tschersich, and Christian Weber provided valuable feedback to a draft version of this paper.
- 1.Rannenberg, K.: Recent development in information technology security evaluation – the need for evaluation criteria for multilateral security. In: Sizer, R., Yngström, L., Kaspersen, H., Fischer-Hübner, S. (eds.) Security and Control of Information Technology in Society – Proceedings of the IFIP TC9/WG 9.6 Working Conference, Onboard M/S Ilich and ashore at St. Petersburg, Russia, 12–17 August 1993. North-Holland Publishers, Amsterdam (1994). ISBN 0-444-81831-6Google Scholar
- 2.Rannenberg, K.: Multilateral security - a concept and examples for balanced security. In: Proceedings of the 9th ACM New Security Paradigms Workshop 2000, 19–21 September 2000, pp. 151–162. ACM Press. ISBN: 1-58113-260-3Google Scholar
- 3.Attribute-Based Credentials for Trust (ABC4Trust): https://abc4trust.eu
- 4.International Federation for Information Processing: IFIP statement on intentional weakening of security and trust mechanisms in ICT and the internet by government agencies and other major actors. www.ifip.org/images/stories/ifip/public/Announcements/web%20ifip%20statement%20underminingsecuritytrust%20mechanisms%204%200.pdf (2014). Accessed 23 April 2014