%0 Conference Proceedings %T Evolving a Secure Internet %+ Queensland University of Technology [Brisbane] (QUT) %+ City University of Hong Kong [Hong Kong] (CUHK) %+ International Information Security Consultants Pty Ltd %A Caelli, William, J. %A Kwok, Lam-For %A Longley, Dennis %Z Part 2: Authentication and Authorization %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 28th Security and Privacy Protection in Information Processing Systems (SEC) %C Auckland, New Zealand %Y Lech J. Janczewski %Y Henry B. Wolfe %Y Sujeet Shenoi %I Springer %3 Security and Privacy Protection in Information Processing Systems %V AICT-405 %P 42-54 %8 2013-07-08 %D 2013 %R 10.1007/978-3-642-39218-4_4 %K Secure Internet %K trust relationship model %K Internet trust relationships %Z Computer Science [cs]Conference papers %X Internet insecurity is inevitable if a high proportion of Internet users are insufficiently aware of the inherent risks involved, whilst those cognizant of those risks are denied the facilities to manage and control them. This paper highlights the first issue and discusses a potential approach to the second. %G English %Z TC 11 %2 https://inria.hal.science/hal-01463845/document %2 https://inria.hal.science/hal-01463845/file/978-3-642-39218-4_4_Chapter.pdf %L hal-01463845 %U https://inria.hal.science/hal-01463845 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-SEC %~ IFIP-AICT-405