%0 Conference Proceedings %T From Protecting a System to Protecting a Global Ecosystem %+ Columbia University [New York] %A Yung, Moti %Z Part 3: Part IV: Keynotes %< avec comité de lecture %( Lecture Notes in Computer Science %B 12th Communications and Multimedia Security (CMS) %C Ghent, Belgium %Y Bart Decker %Y Jorn Lapon %Y Vincent Naessens %Y Andreas Uhl %I Springer %3 Communications and Multimedia Security %V LNCS-7025 %P 255-255 %8 2011-10-19 %D 2011 %R 10.1007/978-3-642-24712-5_29 %Z Computer Science [cs] %Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]Conference papers %X The area of security used to be classified by technologies: authentication, access control, monitoring, firewalls, cryptography, etc., or by systems: web security, application security, database security, operating systems security, communication security, etc. However, nowadays, in order to operate a service over the Internet, facing customers, one needs to manage a complex infrastructure. This infrastructure hosts many components, numerous technologies, and various devices and computers. The infrastructures and their supported systems are dynamically evolving and can be characterized as ecosystems. On the other hand, attackers over the global Internet exploit weaknesses in one component to attack other parts of the system, taking advantage of lack of global security view. The trend will only increase in the future as more computers are embedded in the infrastructure and more demanding applications are to be developed, and as bigger parts of the global economy move to cyberspace.Given the state of the art and future developments, it seems mandatory to develop a holistic yet practical approach to protect the computing infrastructure, and to embed it in the ecosystem development process. This infrastructure will be a collection of inter related ecosystems, with providers at the center of each ecosystem. In addition, the ecosystem has to be dynamically evolving. The position stated here is that approaches and methodologies for security will need to change and evolve as well. The view of security as a process rather than as a component is becoming clearer, given the global trend, and the integration of security with the various other steps of the ecosystem evolution is becoming a must as well. %G English %Z TC 6 %Z TC 11 %2 https://inria.hal.science/hal-01596198/document %2 https://inria.hal.science/hal-01596198/file/978-3-642-24712-5_29_Chapter.pdf %L hal-01596198 %U https://inria.hal.science/hal-01596198 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-TC6 %~ IFIP-CMS %~ IFIP-LNCS-7025