普及网络中的信任和安全(pervasivetrust 2005)

S. Rao
{"title":"普及网络中的信任和安全(pervasivetrust 2005)","authors":"S. Rao","doi":"10.1109/SECCMW.2005.1588325","DOIUrl":null,"url":null,"abstract":"The twenty-first century is the era of the Internet. The Internet combines techniques of traditional industry and info-communication. Trustworthiness of communication is the key of healthy information society. Trust and associated security have become the important issues of all current discussions due to a variety of reasons, including data protection, economic dependency, national security and e-commerce. Trust has to be built among users for the usage of network infrastructure by protecting and providing for the confidentiality, integrity, availability and authentication of information and communication systems, including the data and information they transfer. Today there is a huge number of security technologies available on various layers of the protocol stack. All these different kinds of security technologies, which are partly already complex by themselves, make it difficult for the ordinary user to do the correct selection and configuration for his indiviual needs as well as the security requirements of the user's current ambience. The main focus of current research activities is to improve the userfriendliness for applying security technologies and therefore paving the way to a broader deployment of security in general and build trust. The workshop on ‘Trust and Security in pervasive networking’ provides a global overview of trust and security issues in pervasive communication networks. The workshop will cover an overview of existing and emerging security technologies and will describe their functionality and provide information about the threats and vulnerabilities they are defeating, their level of maturity and their complexity. The speakers are expected to address the well known solutions towards building trustworthy networks. The session also provides the limitations of current communication security in the rising multimedia communication age and the need for more complex/subtle security mechanisms and policies. The invited speakers will provide a short description of new security paradigms with the emergence of the ambient intelligence concept (infospheres and virtual paradigms) and new architectures (P2P, Virtual entities ...) and their application to sensor networks. The new environment (“always connected”, nomadic users, mobile infrastructures, heterogeneity ...) and the pregnant morphology of information systems that require a drastic change of our static vision of legislations and rules for security policies to be enforced, implemented and verified. The workshop will address new aspects of protection and security functions required for users, in a private infosphere (virtual identity, authentication with time and space, anonymity, non-observability, digital rights management, biometry), in a networked infosphere (virtual private networks, new firewalls, inter-network security), and in an open public infosphere. The invited speaker from the European Security initiative will also explain SEINIT's approach to shield the complexity of security from the user by deploying a virtual security architecture. It will explain the integration of various security technologies into this SEINIT architecture and describe the process of establishing security associations. The sessions will discuss emerging vulnerabilities and outlines a systemic approach to security aimed at protecting critical infrastructures and attenuating the risk of inter-","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"279 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Trust and security in pervasive networking (pervasivetrust 2005)\",\"authors\":\"S. Rao\",\"doi\":\"10.1109/SECCMW.2005.1588325\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The twenty-first century is the era of the Internet. The Internet combines techniques of traditional industry and info-communication. Trustworthiness of communication is the key of healthy information society. Trust and associated security have become the important issues of all current discussions due to a variety of reasons, including data protection, economic dependency, national security and e-commerce. Trust has to be built among users for the usage of network infrastructure by protecting and providing for the confidentiality, integrity, availability and authentication of information and communication systems, including the data and information they transfer. Today there is a huge number of security technologies available on various layers of the protocol stack. All these different kinds of security technologies, which are partly already complex by themselves, make it difficult for the ordinary user to do the correct selection and configuration for his indiviual needs as well as the security requirements of the user's current ambience. The main focus of current research activities is to improve the userfriendliness for applying security technologies and therefore paving the way to a broader deployment of security in general and build trust. The workshop on ‘Trust and Security in pervasive networking’ provides a global overview of trust and security issues in pervasive communication networks. The workshop will cover an overview of existing and emerging security technologies and will describe their functionality and provide information about the threats and vulnerabilities they are defeating, their level of maturity and their complexity. The speakers are expected to address the well known solutions towards building trustworthy networks. The session also provides the limitations of current communication security in the rising multimedia communication age and the need for more complex/subtle security mechanisms and policies. The invited speakers will provide a short description of new security paradigms with the emergence of the ambient intelligence concept (infospheres and virtual paradigms) and new architectures (P2P, Virtual entities ...) and their application to sensor networks. The new environment (“always connected”, nomadic users, mobile infrastructures, heterogeneity ...) and the pregnant morphology of information systems that require a drastic change of our static vision of legislations and rules for security policies to be enforced, implemented and verified. The workshop will address new aspects of protection and security functions required for users, in a private infosphere (virtual identity, authentication with time and space, anonymity, non-observability, digital rights management, biometry), in a networked infosphere (virtual private networks, new firewalls, inter-network security), and in an open public infosphere. The invited speaker from the European Security initiative will also explain SEINIT's approach to shield the complexity of security from the user by deploying a virtual security architecture. It will explain the integration of various security technologies into this SEINIT architecture and describe the process of establishing security associations. The sessions will discuss emerging vulnerabilities and outlines a systemic approach to security aimed at protecting critical infrastructures and attenuating the risk of inter-\",\"PeriodicalId\":382662,\"journal\":{\"name\":\"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.\",\"volume\":\"279 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECCMW.2005.1588325\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECCMW.2005.1588325","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

21世纪是互联网的时代。互联网结合了传统工业技术和信息通信技术。传播诚信是健康信息社会的关键。由于各种原因,包括数据保护、经济依赖、国家安全和电子商务,信任和相关安全已经成为当前所有讨论的重要问题。必须在使用网络基础结构的用户之间建立信任,保护和提供信息和通信系统的机密性、完整性、可用性和认证,包括它们传输的数据和信息。如今,在协议栈的各个层上有大量可用的安全技术。所有这些不同种类的安全技术,部分本身就已经很复杂,使得普通用户很难根据自己的个性化需求以及用户当前环境的安全要求进行正确的选择和配置。当前研究活动的主要重点是提高应用安全技术的用户友好性,从而为更广泛地部署安全铺平道路,并建立信任。“普及网络中的信任和安全”研讨会提供了普及通信网络中的信任和安全问题的全球概述。研讨会将涵盖现有和新兴安全技术的概述,描述它们的功能,并提供有关它们正在击败的威胁和漏洞、它们的成熟度和复杂性的信息。演讲者将讨论建立可信赖网络的众所周知的解决方案。讨论了当前通信安全在日益发展的多媒体通信时代的局限性,以及对更复杂/微妙的安全机制和策略的需求。受邀演讲者将简要介绍随着环境智能概念(信息空间和虚拟范式)和新架构(P2P,虚拟实体…)的出现而出现的新安全范式及其在传感器网络中的应用。新的环境(“始终连接”、游牧用户、移动基础设施、异构性……)和信息系统的孕育形态,要求我们对安全策略的静态立法和规则的看法发生重大变化,以便执行、实施和验证。讲习班将讨论在私有信息圈(虚拟身份、时间和空间认证、匿名性、不可观察性、数字权利管理、生物识别)、网络信息圈(虚拟专用网、新型防火墙、网络间安全)和开放公共信息圈中用户所需的保护和安全功能的新方面。来自欧洲安全倡议的受邀演讲者还将解释SEINIT通过部署虚拟安全架构来屏蔽用户安全复杂性的方法。它将解释各种安全技术集成到这个SEINIT架构中,并描述建立安全关联的过程。会议将讨论新出现的漏洞,并概述旨在保护关键基础设施和降低相互攻击风险的系统安全方法
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Trust and security in pervasive networking (pervasivetrust 2005)
The twenty-first century is the era of the Internet. The Internet combines techniques of traditional industry and info-communication. Trustworthiness of communication is the key of healthy information society. Trust and associated security have become the important issues of all current discussions due to a variety of reasons, including data protection, economic dependency, national security and e-commerce. Trust has to be built among users for the usage of network infrastructure by protecting and providing for the confidentiality, integrity, availability and authentication of information and communication systems, including the data and information they transfer. Today there is a huge number of security technologies available on various layers of the protocol stack. All these different kinds of security technologies, which are partly already complex by themselves, make it difficult for the ordinary user to do the correct selection and configuration for his indiviual needs as well as the security requirements of the user's current ambience. The main focus of current research activities is to improve the userfriendliness for applying security technologies and therefore paving the way to a broader deployment of security in general and build trust. The workshop on ‘Trust and Security in pervasive networking’ provides a global overview of trust and security issues in pervasive communication networks. The workshop will cover an overview of existing and emerging security technologies and will describe their functionality and provide information about the threats and vulnerabilities they are defeating, their level of maturity and their complexity. The speakers are expected to address the well known solutions towards building trustworthy networks. The session also provides the limitations of current communication security in the rising multimedia communication age and the need for more complex/subtle security mechanisms and policies. The invited speakers will provide a short description of new security paradigms with the emergence of the ambient intelligence concept (infospheres and virtual paradigms) and new architectures (P2P, Virtual entities ...) and their application to sensor networks. The new environment (“always connected”, nomadic users, mobile infrastructures, heterogeneity ...) and the pregnant morphology of information systems that require a drastic change of our static vision of legislations and rules for security policies to be enforced, implemented and verified. The workshop will address new aspects of protection and security functions required for users, in a private infosphere (virtual identity, authentication with time and space, anonymity, non-observability, digital rights management, biometry), in a networked infosphere (virtual private networks, new firewalls, inter-network security), and in an open public infosphere. The invited speaker from the European Security initiative will also explain SEINIT's approach to shield the complexity of security from the user by deploying a virtual security architecture. It will explain the integration of various security technologies into this SEINIT architecture and describe the process of establishing security associations. The sessions will discuss emerging vulnerabilities and outlines a systemic approach to security aimed at protecting critical infrastructures and attenuating the risk of inter-
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信