{"title":"Panel: research agenda for data and application security","authors":"X. Wang","doi":"10.1145/1943513.1943551","DOIUrl":null,"url":null,"abstract":"PANEL SUMMARY Data and application security is traditionally viewed as a subfield of cybersecurity. The goal is still the same, namely to provide trustworthy computing infrastructure. However, in data and application security, we are dealing with the infrastructural aspects that are closer to humans, their interactions with the system, their perceptions, and their values. Data should not be treated as just bits, but as semantically rich content. Hence, securing data may be different from securing bits. Application software is much more diverse than system software, often directly responding to particular end-user needs. Hence, usability of security may be of more importance.","PeriodicalId":90472,"journal":{"name":"CODASPY : proceedings of the ... ACM conference on data and application security and privacy. ACM Conference on Data and Application Security & Privacy","volume":"97 1","pages":"283-284"},"PeriodicalIF":0.0000,"publicationDate":"2011-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"CODASPY : proceedings of the ... ACM conference on data and application security and privacy. ACM Conference on Data and Application Security & Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1943513.1943551","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
PANEL SUMMARY Data and application security is traditionally viewed as a subfield of cybersecurity. The goal is still the same, namely to provide trustworthy computing infrastructure. However, in data and application security, we are dealing with the infrastructural aspects that are closer to humans, their interactions with the system, their perceptions, and their values. Data should not be treated as just bits, but as semantically rich content. Hence, securing data may be different from securing bits. Application software is much more diverse than system software, often directly responding to particular end-user needs. Hence, usability of security may be of more importance.