Abstract
In 2004 the series of annual Secure Data Management workshops as part of VLDB began, so SDM can now celebrate its 10th edition. It is less clear, when research in the area of security began; even for ICT security this is unclear. One could claim, that security research started thousands of years ago, when the original Trojan Horse was designed. While one can probably find even earlier references to research on security issues, referring to the Trojan Horse can also take its justification from the fact, that the original Trojan Horse lead to a decisive end of a security issue after about 10 years. In any case it illustrates, that already several millennia of thinking (or not-thinking) were spent on the issue. Therefore this text starts with a description of relevant goals (1) as well as technical and other trends (2). Then (3) relevant instruments for ICT security are derived from the goals and trends. These instruments are not necessarily new but important for research due to their relevance in general or due to their high number of relevant open questions.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Rannenberg, K.: Recent development in information technology security evaluation – the need for evaluation criteria for multilateral security. In: Sizer, R., Yngström, L., Kaspersen, H., Fischer-Hübner, S. (eds.) Security and Control of Information Technology in Society – Proceedings of the IFIP TC9/WG 9.6 Working Conference, Onboard M/S Ilich and ashore at St. Petersburg, Russia, 12–17 August 1993. North-Holland Publishers, Amsterdam (1994). ISBN 0-444-81831-6
Rannenberg, K.: Multilateral security - a concept and examples for balanced security. In: Proceedings of the 9th ACM New Security Paradigms Workshop 2000, 19–21 September 2000, pp. 151–162. ACM Press. ISBN: 1-58113-260-3
Attribute-Based Credentials for Trust (ABC4Trust): https://abc4trust.eu
International Federation for Information Processing: IFIP statement on intentional weakening of security and trust mechanisms in ICT and the internet by government agencies and other major actors. www.ifip.org/images/stories/ifip/public/Announcements/web%20ifip%20statement%20underminingsecuritytrust%20mechanisms%204%200.pdf (2014). Accessed 23 April 2014
Acknowledgement
André Deuker, Markus Tschersich, and Christian Weber provided valuable feedback to a draft version of this paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Rannenberg, K. (2014). Where Security Research Should Go in the Next Decade. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2013. Lecture Notes in Computer Science(), vol 8425. Springer, Cham. https://doi.org/10.1007/978-3-319-06811-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-06811-4_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-06810-7
Online ISBN: 978-3-319-06811-4
eBook Packages: Computer ScienceComputer Science (R0)