%0 Conference Proceedings %T From Access Control to Trust Management, and Back – A Petition %+ Hamburg University of Technology (TUHH) %A Gollmann, Dieter %Z Part 1: Extended Abstracts for Keynote Speakers %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 5th International Conference on Trust Management (TM) %C Copenhagen, Denmark %Y Ian Wakeman %Y Ehud Gudes %Y Christian Damsgaard Jensen %Y Jason Crampton %I Springer %3 Trust Management V %V AICT-358 %P 1-8 %8 2011-06-29 %D 2011 %R 10.1007/978-3-642-22200-9_1 %Z Computer Science [cs]Conference papers %X In security too often services are understood not from first principles but via characteristic mechanisms used for their delivery. Access control had got tied up with DAC, MAC, RBAC and reference monitors. With developments in distributed systems security and with the opening of the Internet for commercial use new classes of access control mechanisms became relevant that did not fit into the established mold. Trust Management was coined as a term unifying the discussion of those mechanisms. We view trust as a placeholder that had its use in driving this research agenda, but argue that trust is so overloaded that it is now an impediment for further progress. Our petition asks for a return to access control and proposes a new framework for structuring investigations in this area. %G English %Z TC 11 %Z WG 11.11 %2 https://inria.hal.science/hal-01568677/document %2 https://inria.hal.science/hal-01568677/file/978-3-642-22200-9_1_Chapter.pdf %L hal-01568677 %U https://inria.hal.science/hal-01568677 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-TM %~ IFIP-WG11-11 %~ IFIP-AICT-358