Key management

Computational trust

In information security, computational trust is the generation of trusted authorities or user trust through cryptography. In centralised systems, security is typically based on the authenticated identity of external parties. Rigid authentication mechanisms, such as public key infrastructures (PKIs) or Kerberos, have allowed this model to be extended to distributed systems within a few closely collaborating domains or within a single administrative domain. During recent years, computer science has moved from centralised systems to distributed computing. This evolution has several implications for security models, policies and mechanisms needed to protect users’ information and resources in an increasingly interconnected computing infrastructure. Identity-based security mechanisms cannot authorise an operation without authenticating the claiming entity. This means that no interaction can occur unless both parties are known by their authentication frameworks. Spontaneous interactions would, therefore, require a single, or a few trusted certificate authorities (CAs). In the present context, PKI has not been considered since they have issues, thus it is unlikely that they will establish themselves as a reference standard in the near future. A user who wishes to collaborate with another party can choose between enabling security and thereby disabling spontaneous collaboration, or disabling security and enabling spontaneous collaboration. It is fundamental that mobile users and devices can authenticate in an autonomous way without relying on a common authentication infrastructure. In order to face this problem, we need to examine the challenges introduced by "global computing", a term coined by the EU for the future of the global information society, and to identify their impact on security. Cryptocurrencies, such as Bitcoin, use methods such as proof of work (PoW) to achieve computational trust inside the transaction network. (Wikipedia).

Video thumbnail

Human Trust vs. Cyber Trust

Between two humans, trust is based on personal interactions, with the ability to revoke said trust, and not necessarily with the subsumed trust of third parties. But in exchange for convenience, we have given up much of that personal trust in exchange for cyber trust, where computers decid

From playlist Technology

Video thumbnail

Lower Bound on Complexity - Intro to Algorithms

This video is part of an online course, Intro to Algorithms. Check out the course here: https://www.udacity.com/course/cs215.

From playlist Introduction to Algorithms

Video thumbnail

Trusted CI Webinar: SCI Trust Framework with David Kelsey

Originally recorded September 24, 2018 Slides: http://hdl.handle.net/2142/101446 E-Infrastructures recognise that controlling information security is crucial for providing continuous and trustworthy services for their user communities. Such infrastructures, including grids and clouds, ar

From playlist Center for Applied Cybersecurity Research (CACR)

Video thumbnail

RailsConf 2022 - Do You Trust Me? A look at Trust, Time, and Teams by John DeWyze

I've got a deal for you. You give me some trust, I'll give you some time back. No strings attached. Trust is core to working on a team. We give a little trust, so we can save time. We use systems to create/protect/and outsource trust: PRs, pairing, code cov, type systems, etc. Join me for

From playlist RailsConf 2022

Video thumbnail

Computational Linguistics, by Lucas Freitas

As computers become more and more present in our lives, making our interactions with them more intuitive and natural is essential. Computational linguistics refers to the field of computer science that uses computer science to do interesting things with natural language. Examples of large

From playlist CS50 Seminars 2013

Video thumbnail

System Security

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Toward a Computational Interpretation of Univalence - Daniel Licata

Daniel Licata Carnegie Mellon University; Member, School of Mathematics October 18, 2012 For more videos, visit http://video.ias.edu

From playlist Mathematics

Video thumbnail

Carbon Trust Innovations -- addressing market failures in the development of...

Google Tech Talks October 30, 2008 ABSTRACT The Carbon Trust is a private company set up the by the UK government to combat the threat of anthropogenic climate change. It has a simple but profound mission: "to accelerate the move to a low-carbon economy by working with organisations to r

From playlist Energy and the Environment

Video thumbnail

CERIAS Security: Net Trust: Identification Through Social Context 1/6

Clip 1/6 Speaker: Jean Camp · Indiana University In the nineties the disconnection between physical experience and the digital networked experience was celebrated - individuals are said to move into cyberspace, become virtual and leave the constraints of the physical realm. The increa

From playlist The CERIAS Security Seminars 2006

Video thumbnail

CERIAS Security: PlugNPlay Trust for Embedded Communication Systems 2/6

Clip 2/6 Speaker: Raquel Hill · Indiana University Given the proliferation of malware, the integrity of embedded communication systems is becoming a growing concern. Recent compromises to systems such as ATMs and network switches and routers provide evidence of the potential security pro

From playlist The CERIAS Security Seminars 2009

Video thumbnail

CERIAS Security: Provenance based Data Trustworthiness Assessment in Data Streams 4/5

Clip 4/5 Speaker: Hyo-Sang Lim · Purdue University This talk presents a systematic approach for estimating the trustworthiness of data items in data stream environments (such as sensor networks). The approach uses the data item provenance as well as their values. To obtain trust scores,

From playlist The CERIAS Security Seminars 2010

Video thumbnail

ShmooCon 2013: DIY: Using Trust To Secure Embedded Projects

For more information and to download the video visit: http://bit.ly/shmoocon2013 Playlist ShmooCon 2013: http://bit.ly/Shmoo13 Speakers: Teddy Reed and David Anthony This presentation and paper provides a DIY guide to using Trusted Computing on embedded devices. This is NOT an introducti

From playlist ShmooCon 2013

Video thumbnail

CERIAS Security: Towards Effective and Efficient Behavior-based Trust Models 1/6

Clip 1/6 Speaker: Klemens Boehm · Professor of Computer Science · Karlsruhe University Trust models have been touted to facilitate cooperation among unknown entities. In our current work, we are interested in behavior-based trust models, i.e., models that derive the trustworthiness of

From playlist The CERIAS Security Seminars 2007

Video thumbnail

CERIAS Security: Provenance based Data Trustworthiness Assessment in Data Streams 1/5

Clip 1/5 Speaker: Hyo-Sang Lim · Purdue University This talk presents a systematic approach for estimating the trustworthiness of data items in data stream environments (such as sensor networks). The approach uses the data item provenance as well as their values. To obtain trust scores,

From playlist The CERIAS Security Seminars 2010

Video thumbnail

CERIAS Security: Provenance based Data Trustworthiness Assessment in Data Streams 3/5

Clip 3/5 Speaker: Hyo-Sang Lim · Purdue University This talk presents a systematic approach for estimating the trustworthiness of data items in data stream environments (such as sensor networks). The approach uses the data item provenance as well as their values. To obtain trust scores,

From playlist The CERIAS Security Seminars 2010

Video thumbnail

Trusted CI Webinar: Trustworthy Decision Making and Artificial Intelligence with Arjan Durresi

Originally recorded April 27th, 2020 Slides: http://hdl.handle.net/2142/106949 Algorithms and computers have been used for a long time in supporting decision making in various fields of human endeavors. Examples include optimization techniques in engineering, statistics in experiment de

From playlist Center for Applied Cybersecurity Research (CACR)

Video thumbnail

CERIAS Security: PlugNPlay Trust for Embedded Communication Systems 1/6

Clip 1/6 Speaker: Raquel Hill · Indiana University Given the proliferation of malware, the integrity of embedded communication systems is becoming a growing concern. Recent compromises to systems such as ATMs and network switches and routers provide evidence of the potential security pro

From playlist The CERIAS Security Seminars 2009

Video thumbnail

How to Build Trust on Your Virtual Team

Four tips for unifying and strengthening globally dispersed teams. (Originally published July 14, 2015) Teams can’t function well when co-workers don’t trust one another. Building and maintaining trust in the traditional, physical workplace is difficult enough, but the process is even to

From playlist HBR on Coronavirus

Related pages

Information security | Social network | Artificial intelligence | Game theory | Kerberos (protocol) | Bitcoin | Proof of work | Cryptography | Public key infrastructure